In the recent years, remote sensing applications have a great interest because it's offers many advantages, benefits and possibilities for the applications that using this concept, satellite it's one must important applications for remote sensing, it's provide us with multispectral images allow as study many problems like changing in ecological cover or biodiversity for earth surfers, and illustrated biological diversity of the studied areas by the presentation of the different areas of the scene taken depending on the length of the characteristic wave, Thresholding it's a common used operation for image segmentation, it's seek to extract a monochrome image from gray image by segment this image to two region (foreground & background) depending on pixels intensity to reducing image distortion, and also separated the target area from the rest of scene features under study, so we seek to used number of thresholding techniques in this paper for clarify the importance of this concept in image processing and we proposed a new statistical thresholding techniques which compared with techniques used, and the result showed the advantage of proposed techniques that achieved from applying the techniques on multispectral satellite image takin for an area west of Iraq that characterized their environmental diversity so it's a good case to study.
The current study was conducted with the aim of fortifying meat burger with the protein isolate extracted from defatted sweetened and unsweetened apricot kernels. The antimicrobial activity of defatted apricot kernels and protein isolates of sweetened and unsweetened kernels against some pathogenic microbes was studied, and it was characterized by its effect on gram-positive bacteria more than gram-negative bacteria. As for its effect on yeast, the inhibition diameter was 4.5 mm at a concentration of 200 mg for the unsweetened protein isolate. As for its effect on mold, the inhibition percentage was between 56.05 65.21% for all samples at a concentration of 100 mg. The sweetened and unsweetened protein isolate was used in the manufact
... Show MoreThis study was conducted to determine the side effects of dexamethasone n some physiological and immunological criteria, which included, Measuring sugar level, liver (ALT, AST , LDH, Total protein) and kidney function (urea, createnine), total and differential count of W.B.C,CRP, TNF-α ,IL6,IL10. thirty rats were divided into two groups (15\ rat). G1: This group was considered negative control injection with normal saline, G2: This group was injected with 2 mg\kg dexamethasone. The results showed a significant increase in the level of enzymesALT, AST and sugar levels and decreased level of total protein in the group treated with the drug, also showed, a significant decrease in the total number of W.B.C an
... Show MoreOne of the artificial lightweight aggregates with a wide range of applications is Lightweight Expanded Clay Aggregate. Clay is utilized in the production of light aggregates. Using leftover clay from significant infrastructure development projects to manufacture lightweight aggregates has a favorable environmental impact. This research examines the expanded clay aggregate production process and the impact of processing parameters on its physical and mechanical qualities. It also looks at secondary components that can be used to improve the qualities of concrete with expanded clay aggregates. The effect of the quantity of expanded clay aggregate on the fresh, hardened, and durability qualities of concrete is also studied.
... Show MoreThis paper aims to shed light on adaptive reuse in traditional architecture (TA) in Erbil, Iraq.
An inductive approach and qualitative method were used in this study. The inductive research approach was used because there was no clear image of adaptive reuse in traditional cafés (TCs) in Erbil. Besides, there are no studies of TCs in Erbil particularly. Thus, there is a lack of knowledge about what adaptations took place in TCs in Erbil. The qualitative method extracted themes and issues from case studies of four TCs in Erbil citadel'
The present study was carried out to investigate the effect of oral administration of hot aqueous extract of beetle cocoon Larinus maculatus Faldermann, in a two doses 50 and100mg/Kg/Bw for 25 and 45days respect- tively on some organs such as liver, lung, kidney, intestine, heart, spleen, and brain in male mice Mus musculus. The results indicated that there were toxicopathological changes in many tissues of experimental animals. Histo -pathological changes was dose and period dependent . It was found that the aqueous extract of beetle cocoon has undesirable effect at the administered doses, since the raw extract of this cocoon is currently being used in Folk medicine as treatment for cough, bronchitis in Iraq. This study revealed that the l
... Show MoreThe seed propagation is the predominant method of Echinacea propagation, which has been criticized for its time-consuming control over the separation factor and the uncertainty of pathogen-free plants produced by this method. The technology of tissue culture has provided multiple opportunities for the production of secondary metabolites continuously without being restricted to a specific season, due to the possibility of controlling the environmental conditions and the components of the nutrient medium needed by the plant. This study was conducted to investigate the effects of salicylic acid as elicitor and tyrosine as precursor on propagation and some secondary compounds production in coneflower in vitro. The result showed the superiori
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreSoftware Defined Network (SDN) is a new technology that separate the control plane from the data plane. SDN provides a choice in automation and programmability faster than traditional network. It supports the Quality of Service (QoS) for video surveillance application. One of most significant issues in video surveillance is how to find the best path for routing the packets between the source (IP cameras) and destination (monitoring center). The video surveillance system requires fast transmission and reliable delivery and high QoS. To improve the QoS and to achieve the optimal path, the SDN architecture is used in this paper. In addition, different routing algorithms are used with different steps. First, we eva
... Show MoreIn general, path-planning problem is one of most important task in the field of robotics. This paper describes the path-planning problem of mobile robot based on various metaheuristic algorithms. The suitable collision free path of a robot must satisfies certain optimization criteria such as feasibility, minimum path length, safety and smoothness and so on. In this research, various three approaches namely, PSO, Firefly and proposed hybrid FFCPSO are applied in static, known environment to solve the global path-planning problem in three cases. The first case used single mobile robot, the second case used three independent mobile robots and the third case applied three follow up mobile robot. Simulation results, whi
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show More