The study was carried out to study the quality of 7 samples of imported frozen chicken that are available in locally markets. These samples were collected from Baghdad markets in June 2010. The results were showed that the all samples were not content the name of company and batch number one the labeling, while the microbial test refer to found contamination in all samples, but it in the limited of Iraqi standers specification for frozen chicken, also note Staphylococcus aureus in all samples, the samples C1 and C2 have Salmonella ohio, while not observe Coliform bacteria in all samples.
The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
The meniscus has a crucial function in human anatomy, and Magnetic Resonance Imaging (M.R.I.) plays an essential role in meniscus assessment. It is difficult to identify cartilage lesions using typical image processing approaches because the M.R.I. data is so diverse. An M.R.I. data sequence comprises numerous images, and the attributes area we are searching for may differ from each image in the series. Therefore, feature extraction gets more complicated, hence specifically, traditional image processing becomes very complex. In traditional image processing, a human tells a computer what should be there, but a deep learning (D.L.) algorithm extracts the features of what is already there automatically. The surface changes become valuable when
... Show MoreWeed control with chemicals is a challenging process that should be performed in a rational way to reduce their negative impact on the surrounding environment. The growth of artificial intelligence algorithms encourages researchers to develop smart spraying robots that detect and spray weeds and distinguish them from the main crop which leads to sustainable use of these chemicals and achieves some of the sustainable development goals. However, few studies are available to comprehensively compare different versions of YOLO algorithm to detect weed. In this research, seven versions of YOLO algorithms were evaluated for their performance to detect and spray four t
Mammography is at present one of the available method for early detection of masses or abnormalities which is related to breast cancer. The most common abnormalities that may indicate breast cancer are masses and calcifications. The challenge lies in early and accurate detection to overcome the development of breast cancer that affects more and more women throughout the world. Breast cancer is diagnosed at advanced stages with the help of the digital mammogram images. Masses appear in a mammogram as fine, granular clusters, which are often difficult to identify in a raw mammogram. The incidence of breast cancer in women has increased significantly in recent years.
This paper proposes a computer aided diagnostic system for the extracti
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreBACKGROUND: HLA-B27 can effect clinical presentation and course of ankylosing spondylitis. Different detection techniques of HLA-B27 are available with variable sensitivities and specificities. OBJECTIVE: To compare serologic and molecular diagnostic techniques of detecting HLA-B27 status and to correlate it with some clinical variables among ankylosing spondylitis patients. PATIENTS AND METHODS: A cross-sectional study was conducted on 83 Iraqi patients with ankylosing spondylitis. Clinical and laboratory evaluations were reported. HLA-B27 status was determined in all patients by real-time PCR using HLA-B27 RealFast™ kit; ELISA method was used as well to detect soluble serum HLA-B27 antigens using Human Leukocyte Antigen® kit. RESULTS:
... Show MoreDuring COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve
... Show MoreThe research aims at the following:
- Identifying the level of internal quantity efficiency in Medical colleges, University of Baghdad by determining the level of productivity for one group for the total batch according to sex variable (males and females). Procedures of the study
The researcher used the descriptive and analytical method has been used by following them up enhanced by flow indicators of students for one session depending on special statistical data analyss .
The results are as follows:
- The Faculty of Medicine were higher productivity scholarships for one year and two years of schooling, as well as the highest in the efficiency of the Faculty o
... Show More