Nowadays, 3D content is becoming an essential part of multimedia applications, when the 3D content is not protected, hackers may attack and steal it. This paper introduces a proposed scheme that provides high protection for 3D content by implementing multiple levels of security with preserving the original size using weight factor (w). First level of security is implemented by encrypting the texture map based on a 2D Logistic chaotic map. Second level is implemented by shuffling vertices (confusion) based on a 1D Tent chaotic map. Third level is implemented by modifying the vertices values (diffusion) based on a 3D Lorenz chaotic map. Results illustrate that the proposed scheme is completely deform the entire 3D content accord
... Show MoreIn this work, we prove by employing mapping Cone that the sequence and the subsequence of the characteristic-zero are exact and subcomplex respectively in the case of partition (6,6,4) .
The Yamama Formation belongs to the late Berriasian-Aptian succession, which was deposited during the Lower Cretaceous period within the main shallow marine depositional environment.
Petrographic study and microfacies analysis enabled the recognition of six main microfacies for three association facies. These are the Semi-restricted, Shallow open marine and Shoal environments. The study succession represents deposition of three third order cycles, these cycles where deposited during successive episodes of relative sea level rises and still stand.
The presence of shoal association facies (oolitic packstone microfaces) between the Sulaiy and Yamama formations refer to continue the deposition during the same stage, and may s
... Show MoreSo far, APT (Advanced Persistent Threats) is a constant concern for information security. Despite that, many approaches have been used in order to detect APT attacks, such as change controlling, sandboxing and network traffic analysis. However, success of 100% couldn’t be achieved. Current studies have illustrated that APTs adopt many complex techniques to evade all detection types. This paper describes and analyzes APT problems by analyzing the most common techniques, tools and pathways used by attackers. In addition, it highlights the weaknesses and strengths of the existing security solutions that have been used since the threat was identified in 2006 until 2019. Furthermore, this research proposes a new framework that can be u
... Show MoreIodine-131 has become an essential radionuclide used in nuclear medicine for clinical and research purposes. The increase use of this radionuclide in medicine for diagnostic and treatment of thyroid diseases creates a demand to obtain a feasible methodology for occupational or accidental monitoring of internal contamination. In this study, two techniques were employed to find an appropriate one of in vivo bioassay for evaluating Iodine-131 body content. A scanning Whole Body Counter (WBC) equipped with 6NaI (Tl) scintillation detector, an anthropomorphic phantom and point source were used. The results showed that the counter sensitivity, as a first approach (conventional method), had a logarithmic and significant correlation w
... Show MoreIraq is facing water shortage problems due to various factors, globally ( Global warming) and regionally ( GAP project) and locally ( improper water resources management projects). In this search the global warming influence on the annual mean value of temperature and yet on the annual mean value of the evapotranspiration for more than three decades has been studied. The climate of Iraq is influenced by its location between the subtropical aridity of the Arabian desert areas and the subtropical humidity of the Arabian Gulf. The relative ascension of temperature degrees in the recent decades was the main factor in relative humidity decrement which increase the evapotranspiration values, since that utilizing a temperature-based method as i
... Show MoreDiesel generators are used in various locations throughout Baghdad city, central Iraq, when the public electricity power is in outage. The main purpose of the current research is to investigate possible changes in certain biochemical parameters in the blood of operators of diesel generators in different locations Baghdad city, at both Rusafa and Karkh sides. The workers were divided according to the number of working years.
Serum urea, creatinine, alkaline phosphatase (AlP), aspartate aminotransferase (AST), alanine aminotransferase (ALT), albumin, total serum bilirubin (TSB), and glomerular filtration rate (GFR) were analyzed in samples from forty wo
... Show MoreElastic magnetic electron scattering form factors have been calculated for the ground state J T-3/2 % of. Li in the framework of the many-particle shell model. The calculations are based on the model space wave functions of Cohen-Kurath interaction. The results are compared with the available experimental data. The data are reasonably explained up to q-3.0fim when the size parameter of the harmonic oscillator potential is reduced from that used to fit the root mean square charge radius.
In Baghdad governorate, samples of dried birds waste were obtained from poultry cages for investigate the of the presence of fungi. There was a high proportion of Candida spp., Rhodotorula spp. and filamentous fungi that obtained from the dry droppings. Al samples gave a positive results included 177 isolates, these isolates includes different Candida species 62 isolates (35.02%), Rhodotorula spp. 28 isolates (15.81%), and the following filamentous genera: Aspergillus spp. 50 isolates (28. 24%), (A. niger 20 isolate, A. flavus 18 isolate, A. fumigatus 12 isolate), Penicillium spp. 11 isolates (6.21%) and Mucor spp. 26 isolate (14.68%). The inhibitory effect of the used detergents (with concentration of 10-1 mg/ml.( was ranged from 35 mm
... Show MoreIn the contemporary world, the security of data and privacy policies are major concerns in cloud computing. Data stored on the cloud has been claimed to be unsafe and liable to be hacked. Users have found it difficult to trust their data in the cloud. Users want to know that their data is accessible from anywhere and that an unauthorized user will not be able to access it. Another area of concern is the authentication of users over the cloud. There are a number of security concerns with Cloud Computing which include Distributed Denial of Service, Data leakage, and many more, just to mention a few. In this paper, an Elliptic Curve Cryptography (ECC) algorithm is used for the encryption and decryption of the information stored on
... Show MoreIn real world, almost all networks evolve over time. For example, in networks of friendships and acquaintances, people continually create and delete friendship relationship connections over time, thereby add and draw friends, and some people become part of new social networks or leave their networks, changing the nodes in the network. Recently, tracking communities encountering topological shifting drawn significant attentions and many successive algorithms have been proposed to model the problem. In general, evolutionary clustering can be defined as clustering data over time wherein two concepts: snapshot quality and temporal smoothness should be considered. Snapshot quality means that the clusters should be as precise as possible durin
... Show MoreThe ground state densities of unstable neutron-rich 11Li and 12Be exotic nuclei are studied in the framework of the binary cluster model (BCM). The internal densities of the clusters are described by the single particle harmonic oscillator wave functions. The long tail performance is clearly noticed in the calculated neutron and matter density distributions of these nuclei. The structures of the two valence neutrons in 11Li and 12Be are found to be mixed configurations with dominant (1p1/2)2. Elastic electron scattering proton form factors for 11Li and 12Be are studied using the plane wave Born approximation (PWBA). It is found that the major difference between the calculated form factors of unstable nuclei [11Li, 12Be] and those of stab
... Show MoreCulex quinquefasciatus is an intermediate host of several human pathogens and serve as a vector of filariasis worldwide. Recently, there are increasing efforts to develop new and effective nanoparticles to control mosquito vectors. The green synthesis of ZnO-CuO nanoporous composite using Gum Arabic (Acacia senegalensis) was successfully carried out with Gum Arabic and the composite was characterized by UV-Visible, FTIR, and SEM/EDX techniques. Three different larval instars (1st, 2nd, and 3rd) of Culex quinquefasciatus were exposed to various concentrations (10, 20, 25 mg/l) of the ZnO-CuO nanocomposite for 24 h. The LC50 values fo
... Show MoreThe study area is located in the East of Missan governorate, southeast of Iraq between (32°'29.52" – 32°37'30") latitude and (46°46'21.16" – 47°58'53.52")longitude. It encompasses an area of (1858 ) with elevation ranges from 8 to 165m. Soil is a natural body that exists as part of the pedosphere and which performs four important functions. It is a medium for plant growth and a means of water storage, supply and purification. The spatial mapping of soil usually involves delineating soil types that have identifiable characteristics. The delineation is based on many factors such as geomorphologic origin and conditions under which the soil is formed. Hydrologic soil group (HSG) refers to the classification of soils based on their ru
... Show MoreLet R be an integral domain with quotient field K. A prime ideal P of R is called
a strongly prime ideal of R if for each x, y ∈ K, x y ∈ P implies x ∈ P or y ∈ P. In
this paper, we generalize this concept to submodules, thus we define strongly prime
submodules and give some of their properties.
Importance of Arabic language stemming algorithm is not less than that of other languages stemming in Information Retrieval (IR) field. Lots of algorithms for finding the Arabic root are available and they are mainly categorized under two approaches which are light (stem)-based approach and root-based approach. The latter approach is somehow better than the first approach. A new root-based stemmer is proposed and its performance is compared with Khoja stemmer which is the most efficient root-based stemmers. The accuracy ratio of the proposed stemmer is (99.7) with a difference (1.9) with Khoja stemmer.
The aim of this paper is to approximate multidimensional functions feC(R) by developing a new type of Feedforward neural networks (FFNNs) which we called it Greedy ridge function neural networks (GRGFNNs). Also, we introduce a modification to the greedy algorithm which is used to train the greedy ridge function neural networks. An error bound are introduced in Sobolev space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result in (11)
Secure data communication across networks is always threatened with intrusion and abuse. Network Intrusion Detection System (IDS) is a valuable tool for in-depth defense of computer networks. Most research and applications in the field of intrusion detection systems was built based on analysing the several datasets that contain the attacks types using the classification of batch learning machine. The present study presents the intrusion detection system based on Data Stream Classification. Several data stream algorithms were applied on CICIDS2017 datasets which contain several new types of attacks. The results were evaluated to choose the best algorithm that satisfies high accuracy and low computation time.
Polymer concrete were prepared by mixing epoxy resin with sand particles in three different grain size (150-300) , (300-600 ) and (600- 1200) μm respectively. The percentage of epoxy was 15%, 20 %, 25% and 30% wt of the total weight. Compression strength and flexural strength tests were carried out for the prepared samples.
The percentages of epoxy resin at 20% wt and 25% wt showed best mechanical properties for all grain sizes. These percentages were adopted to fill the voids between particles sand have two different size ranges (150-600) μm and {(150-300) & (600-1200)} μm respectively to obtain more dense material. The results showed that the strength of polymer composite at 20% resin is higher than 25% resin.
The relationship between Al-Wand lake and groundwater was studied in Khanaqin cityby identifying water levels for Al-Wand lake and the shallow groundwater aquifer for 2019 and 2020. The hydrochemical analyses of Al-Wand river water, Al-Wand lake water and shallow groundwater, and identifying the grain size analysis and mineralogy of the surface sediments have been done. This relationship was adopted on climate data of the study area by knowing which seasons contained water surplus or water deficit, and porosity and permeability define of soil that affects groundwater movement, and identify the salinity that effect on water quality.
Aqueous and ethanolic extracts of different parts (seeds, leaves, bark) of neem plant (Azadirachta Indica) were screened for antibacterial activaties against five species of bacteria (Staphylococcus aurous, Staphylococcus epidermises, Acinetobacter baumanni, Psedommonas aeruginosa, and Escherishia coli). Different extracts 40-80 mg/L were tested using Ager-well diffusion method. Neem parts potent demonstrated for anti-bacterial activaties against all microorganisms tested. The results showed that neem seeds aqueous and ethanolic, extract have significant effects for all tested bacteria, the maximum inhibition zone by seeds cold aqueous and cold ethanolic extracts were 22 & 13 mm for E. coli and S. epidermidis respectively; while leav
... Show MoreThe authors introduced and addressed several new subclasses of the family of meromorphically multivalent -star-like functions in the punctured unit disk in this study, which makes use of several higher order -derivatives. Many fascinating properties and characteristics are extracted systematically for each of these newly identified function classes. Distortion theorems and radius problems are among these characteristics and functions. A number of coefficient inequalities for functions belonging to the subclasses are studied, and discussed, as well as a suitable condition for them is set. The numerous results are presented in this study and the previous works on this
... Show MoreThe Arabic Language is the native tongue of more than 400 million people around the world, it is also a language that carries an important religious and international weight. The Arabic language has taken its share of the huge technological explosion that has swept the world, and therefore it needs to be addressed with natural language processing applications and tasks.
This paper aims to survey and gather the most recent research related to Arabic Part of Speech (APoS), pointing to tagger methods used for the Arabic language, which ought to aim to constructing corpus for Arabic tongue. Many AI investigators and researchers have worked and performed POS utilizing various machine-learning methods, such as Hidden-Mark
... Show MoreThis study aimed to stand on genetic effects important of cabergoline drug. This toxic effect was evaluated for three different doses (0.05, 0.1, 0.5 mg/ml) in comparison with control (PBS/ phosphate buffer saline) both in vivo and in vitro. In vivo study involved the cytogenetic evaluation of cabergoline in mice by examination of mitotic index percentage (MI), micronucleus formation (MN) and chromosomal aberrations. Result indicated that all the tested doses cause significant reduction in MI percentage, while significant rise was seen with both MN formation and all studied chromosomal aberrations. While in vitro study involved measuring the effect of cabergoline on normal cell line (REF/ Rat embryonic
... Show MoreThe Escherichia coli isolated from UTIs, were identified with biochemical tests and vitek test.The ethanolic extracts of Zingiberofficinale(Z.officinale) were tested against E.coli by using the good agar diffusion test, the alcoholic extracts from (25 -100) mg/ml showed antimicrobial activity against tested microorganism. The diameter of inhibition zone increase at high concentrations and rang from (18-20mm) , and these results compared with antibiotics sensitivity discs were used by discs diffusion method against E.coliisolates, they were resisted to all antibiotics used in this study. It could be concluded that alcoholic extract of Z.officinalehad good antimicrobial effects, and may be able to use for treatment UTIs caused by E.c
... Show MoreIn this article, performing and deriving the probability density function for Rayleigh distribution by using maximum likelihood estimator method and moment estimator method, then crating the crisp survival function and crisp hazard function to find the interval estimation for scale parameter by using a linear trapezoidal membership function. A new proposed procedure used to find the fuzzy numbers for the parameter by utilizing ( to find a fuzzy numbers for scale parameter of Rayleigh distribution. applying two algorithms by using ranking functions to make the fuzzy numbers as crisp numbers. Then computed the survival functions and hazard functions by utilizing the real data application.
Density Functional Theory (DFT) at the B3LYP/ 6-311G basis set level and
semiemperical methods (PM3, AM1, and MINDO/3) were performed on six new
substituted Schiff bases derivatives of INHC (N-(3-(phenylidene-allylidene)
isonicotinohydrazide) using Gaussian-03 program. The calculated quantum chemical
parameters correlated to the inhibition efficiency were studied and discussed at their
equilibrium geometry and their correct symmetry (Cs). Comparisons of the order of
inhibition efficiency of the Schiff bases derivatives, and local electrophilic and
nucleophilic reactivity have analyzed. Some physical properties also were studied
such as heat of formation, total energy and dipole moment...etc. Also vibration
freq
The study aimed to determine the effect of soybean meal on the histological
structure and some functional parameters of the thyroid gland was investigated in
this study. For this purpose, 24 white male rats were divided into four groups each
of six rats, as following (G1): normal control rats, at the prepubertal life stage, were
dissected after 40 days from the weaning (i.e., from Postnatal Day "PND" 21),
(G2): prepubertal rats, were treated with high dose of soybean meal "40% of daily
diet" for 40 days after the weaning, (G3): normal control rats, at the postpubertal
stage, were dissected after 40 days from the puberty (i.e., from PND 60), (G4):
postpubertal rats, were treated with high dose of soybean meal (40%)
In this paper we give many connections between essentially quasi-Dedekind (quasi-
Dedekind) modules and other modules such that Baer modules, retractable modules,
essentially retractable modules, compressible modules and essentially compressible
modules where an R-module M is called essentially quasi-Dedekind (resp. quasi-
Dedekind) if, Hom(M N ,M ) 0 for all N ≤e M (resp. N ≤ M). Equivalently, a
module M is essentially quasi-Dedekind (resp. quasi-Dedekind) if, for each
f End (M) R , Kerf ≤ e M implies f = 0 (resp. f 0 implies ker f 0 ).
This study deals with the seismic reflection interpretation of lower Cretaceous Formations in Dhufria area, including structural and stratigraphic techniques. In the interpretation process, the 3-D seismic data volume and well logs have been used. Based on well logs and synthetic traces two horizons were identified and picked which are the top and bottom of Zubair Formation. These horizons were followed over all the area in order to obtain structural setting as well as studying Kirkuk group Formation of Tertiary age which represents highstand progradational seismic facies.