A .technology analysis image using crops agricultural of grading and sorting the test to conducted was experiment The device coupling the of sensor a with camera a and 75 * 75 * 50 dimensions with shape cube studio made-factory locally the study to studio the in taken were photos and ,)blue-green - red (lighting triple with equipped was studio The .used were neural artificial and technology processing image using maturity and quality ,damage of fruits the of characteristics external value the quality 0.92062, of was value regression the damage predict to used was network neural artificial The .network the using scheme regression a of means by 0.98654 of was regression the of maturity and 0.97981 of was regression the of .algorithm Marrquardt-Le
In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show MoreAbstract\
In this research, estimated the reliability of water system network in Baghdad was done. to assess its performance during a specific period. a fault tree through static and dynamic gates was belt and these gates represent logical relationships between the main events in the network and analyzed using dynamic Bayesian networks . As it has been applied Dynamic Bayesian networks estimate reliability by translating dynamic fault tree to Dynamic Bayesian networks and reliability of the system appreciated. As was the potential for the expense of each phase of the network for each gate . Because there are two parts to the Dynamic Bayesian networks and two part of gate (AND), which includes the three basic units of the
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreThis study aims to simulate and assess the hydraulic characteristics and residual chlorine in the water supply network of a selected area in Al-Najaf City using WaterGEMS software. Field and laboratory work were conducted to measure the pressure heads and velocities, and water was sampled from different sites in the network and then tested to estimate chlorine residual. Records and field measurements were utilized to validate WaterGEMS software. Good agreement was obtained between the observed and predicted values of pressure with RMSE range between 0.09–0.17 and 0.08–0.09 for chlorine residual. The results of the analysis of water distribution systems (WDS) during maximum demand
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More1.
Embryonic Origin of Neural Tube Defects.
Insaf Jasim Mahmoud
2.
Etiology of Neural Tube Defectss.
Ali Abdul Razzak Obed
3.
Epidemiology of Neural Tube Defects in Iraq.
Mahmood Dhahir Al-Mendalawi
4.
Surgical Management of Neural Tube Defects.
Laith Thamer Al-Ameri
5.
Prevention of Neural Tube Defects in Iraq.
Mahmood Dhahir Al-Mendalawi
The prostheses sockets use normally composite materials which means that their applications may be related with the human body. Therefore, it was very necessary to improve the mechanical properties of these materials. The prosthetic sockets are subjected to varying stresses in gait cycle scenario which may cause a fatigue damage. Therefore, it is necessary or this work to modify the fatigue behavior of the materials used for manufacturing the prostheses sockets. In this work, different Nano particle materials are used to modify the mechanical properties of the composite materials, and increase the fatigue strength. By using an experimental technique, the effect of using different volu
This paper studies the combination fluid viscous dampers in the outrigger system to add supplementary damping into the structure, which purpose to remove the dependability of the structure to lower variable intrinsic damping. It works by connecting the central core, comprising either shear walls or braced frames, to the outer perimeter columns.
The modal considered is a 36 storey square high rise reinforced concrete building. By constructing a discrete lumped mass model, and using frequency-based response function, two systems of dampers, parallel and series systems are studied. The maximum lateral load at the top of the building is calculated, and this load w
... Show More