Preferred Language
Articles
/
jeasiq-1345
Use some statistical algorithms in mock hacking satellite image
...Show More Authors

In the recent years, remote sensing applications have a great interest because it's offers many advantages, benefits and possibilities for the applications that using this concept, satellite it's one must important applications for remote sensing, it's provide us with multispectral images allow as study many problems like changing in ecological cover or biodiversity for earth surfers, and illustrated biological diversity of the studied areas by the presentation of the different areas of the scene taken depending on the length of the characteristic wave, Thresholding it's a common used operation for image segmentation, it's seek to extract a monochrome image from gray image by segment this image to two region (foreground & background) depending on pixels intensity to reducing image distortion, and also separated the target area from the rest of scene features under study, so we seek to used number of  thresholding techniques in this paper for clarify the importance of this concept in image processing and we proposed a new statistical thresholding techniques which compared with techniques used, and the result showed the advantage of proposed techniques that achieved from applying the techniques on multispectral satellite image takin for an area west of Iraq that characterized their environmental diversity so it's a good case to study.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Oct 24 2022
Journal Name
Plant Archives
USE OF APRICOT KERNELS PROTEIN ISOLATE IN BURGER INDUSTRY
...Show More Authors

The current study was conducted with the aim of fortifying meat burger with the protein isolate extracted from defatted sweetened and unsweetened apricot kernels. The antimicrobial activity of defatted apricot kernels and protein isolates of sweetened and unsweetened kernels against some pathogenic microbes was studied, and it was characterized by its effect on gram-positive bacteria more than gram-negative bacteria. As for its effect on yeast, the inhibition diameter was 4.5 mm at a concentration of 200 mg for the unsweetened protein isolate. As for its effect on mold, the inhibition percentage was between 56.05 65.21% for all samples at a concentration of 100 mg. The sweetened and unsweetened protein isolate was used in the manufact

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sat Jun 08 2024
Journal Name
Obstetrics And Gynaecology Forum
Biochemical and Immunological responses to use dexamethasone in rats
...Show More Authors

This study was conducted to determine the side effects of dexamethasone n some physiological and immunological criteria, which included, Measuring sugar level, liver (ALT, AST , LDH, Total protein) and kidney function (urea, createnine), total and differential count of W.B.C,CRP, TNF-α ,IL6,IL10. thirty rats were divided into two groups (15\ rat). G1: This group was considered negative control injection with normal saline, G2: This group was injected with 2 mg\kg dexamethasone. The results showed a significant increase in the level of enzymesALT, AST and sugar levels and decreased level of total protein in the group treated with the drug, also showed, a significant decrease in the total number of W.B.C an

... Show More
Preview PDF
Publication Date
Tue Nov 01 2022
Journal Name
Journal Of Engineering
The Use of Lightweight Aggregate in Concrete: A Review
...Show More Authors

One of the artificial lightweight aggregates with a wide range of applications is Lightweight Expanded Clay Aggregate. Clay is utilized in the production of light aggregates. Using leftover clay from significant infrastructure development projects to manufacture lightweight aggregates has a favorable environmental impact. This research examines the expanded clay aggregate production process and the impact of processing parameters on its physical and mechanical qualities. It also looks at secondary components that can be used to improve the qualities of concrete with expanded clay aggregates. The effect of the quantity of expanded clay aggregate on the fresh, hardened, and durability qualities of concrete is also studied.

... Show More
View Publication Preview PDF
Crossref (10)
Crossref
Publication Date
Thu Jan 05 2023
Journal Name
International Journal Of Building Pathology And Adaptation
Adaptation re-use of traditional cafés in Erbil, Iraq
...Show More Authors
Purpose

This paper aims to shed light on adaptive reuse in traditional architecture (TA) in Erbil, Iraq.

Design/methodology/approach

An inductive approach and qualitative method were used in this study. The inductive research approach was used because there was no clear image of adaptive reuse in traditional cafés (TCs) in Erbil. Besides, there are no studies of TCs in Erbil particularly. Thus, there is a lack of knowledge about what adaptations took place in TCs in Erbil. The qualitative method extracted themes and issues from case studies of four TCs in Erbil citadel'

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Apr 04 2012
Journal Name
The Iraqi Journal Of Veterinary Medicine
Toxicopathological study of aqueous extract of beetle cocoon Larinus maculatus F. on some internal organs in male albino mice
...Show More Authors

The present study was carried out to investigate the effect of oral administration of hot aqueous extract of beetle cocoon Larinus maculatus Faldermann, in a two doses 50 and100mg/Kg/Bw for 25 and 45days respect- tively on some organs such as liver, lung, kidney, intestine, heart, spleen, and brain in male mice Mus musculus. The results indicated that there were toxicopathological changes in many tissues of experimental animals. Histo -pathological changes was dose and period dependent . It was found that the aqueous extract of beetle cocoon has undesirable effect at the administered doses, since the raw extract of this cocoon is currently being used in Folk medicine as treatment for cough, bronchitis in Iraq. This study revealed that the l

... Show More
Preview PDF
Crossref
Publication Date
Tue Jun 20 2023
Journal Name
Baghdad Science Journal
Improving propagation of Echinacea purpurea and its content of some active compounds by using Tyrosine and Salicylic acid in vitro
...Show More Authors

The seed propagation is the predominant method of Echinacea propagation, which has been criticized for its time-consuming control over the separation factor and the uncertainty of pathogen-free plants produced by this method. The technology of tissue culture has provided multiple opportunities for the production of secondary metabolites continuously without being restricted to a specific season, due to the possibility of controlling the environmental conditions and the components of the nutrient medium needed by the plant. This study was conducted to investigate the effects of salicylic acid as elicitor and tyrosine as precursor on propagation and some secondary compounds production in coneflower in vitro. The result showed the superiori

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
A Software Defined Network of Video Surveillance System Based on Enhanced Routing Algorithms
...Show More Authors

Software Defined Network (SDN) is a new technology that separate the ‎control plane from the data plane. SDN provides a choice in automation and ‎programmability faster than traditional network. It supports the ‎Quality of Service (QoS) for video surveillance application. One of most ‎significant issues in video surveillance is how to find the best path for routing the packets ‎between the source (IP cameras) and destination (monitoring center). The ‎video surveillance system requires fast transmission and reliable delivery ‎and high QoS. To improve the QoS and to achieve the optimal path, the ‎SDN architecture is used in this paper. In addition, different routing algorithms are ‎used with different steps. First, we eva

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
A Comparative Study of Various Intelligent Algorithms based Path Planning for Mobile Robots
...Show More Authors

In general, path-planning problem is one of most important task in the field of robotics. This paper describes the path-planning problem of mobile robot based on various metaheuristic algorithms. The suitable collision free path of a robot must satisfies certain optimization criteria such as feasibility, minimum path length, safety and smoothness and so on. In this research, various three approaches namely, PSO, Firefly and proposed hybrid FFCPSO are applied in static, known environment to solve the global path-planning problem in three cases. The first case used single mobile robot, the second case used three independent mobile robots and the third case applied three follow up mobile robot.  Simulation results, whi

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref