Erythrocytes aggregation is an important physiological phenomenon in the circulation of blood, and is a basic characteristic of normal blood that plays a major role in cardiovascular system especially in the microcirculation. Blood samples have been taken from (30) volunteers (15 male, and 15 female), their ages (20-30) years. The Erythrocytes Sedimentation Rate (ESR) for those subjects was measured at different Packed Cells Volume (PCV) (10%-25%), and also it was measured at different temperature (10oC-25oC). The results show that there was a highly significant decrease (P<0.01) in ESR when the PCV increase and a highly significant increase (P<0.01) in ESR when the temperatures increase. The conclusion from these results is that the ESR va
... Show MoreExperimental results on harmonic distortions in 13.56 MHz RF Argon glow discharge using different grounded electrodes areas and electrodes spacing are presented. The experiment is carried out at four pressure values. RF power values used are between 20 and 90 watts. The results indicate significant increase in distortions at two specific values of the cone angle enclosing the two electrodes within its geometrical volume. The computation of the cone head angle gave the symmetry discharge or asymmetry as well as when the angle is small the condition is near symmetry discharge associated with decrease in the nonlinearity.
Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreDue to the large population of motorway users in the country of Iraq, various approaches have been adopted to manage queues such as implementation of traffic lights, avoidance of illegal parking, amongst others. However, defaulters are recorded daily, hence the need to develop a mean of identifying these defaulters and bring them to book. This article discusses the development of an approach of recognizing Iraqi licence plates such that defaulters of queue management systems are identified. Multiple agencies worldwide have quickly and widely adopted the recognition of a vehicle license plate technology to expand their ability in investigative and security matters. License plate helps detect the vehicle's information automatically ra
... Show Morehe Orthogonal Frequency Division Multiplexing is a promising technology for the Next Generation Networks. This technique was selected because of the flexibility for the various parameters, high spectral efficiency, and immunity to ISI. The OFDM technique suffers from significant digital signal processing, especially inside the Inverse/ Fast Fourier Transform IFFT/FFT. This part is used to perform the orthogonality/De-orthogonality between the subcarriers which the important part of the OFDM system. Therefore, it is important to understand the parameter effects on the increase or to decrease the FPGA power consumption for the IFFT/FFT. This thesis is focusing on the FPGA power consumption of the IFFT/FFT uses in the OFDM system. This researc
... Show More
This research worked on identifying the effect of increasing the volume of indebtedness by companies listed on the Iraq Stock Exchange on the trading volume of those companies, and this research included some theoretical concepts related to both debt financing and trading volume, and it represents the research community of the joint-stock companies listed in The Iraq Stock Exchange (the banking sector). As for the research sample, it was deliberately chosen represented by companies with continuous trading without stopping, which reached 10 joint-stock companies, and the period of research was extended during the period 2011-2015, and a set of indicators and financial methods were used In measuring research v
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show More