One of the main environmental problems which affect extensively the areas in the world is soil salinity. Traditional data collection methods are neither enough for considering this important environmental problem nor accurate for soil studies. Remote sensing data could overcome most of these problems. Although satellite images are commonly used for these studies, however there are still needs to find the best calibration between the data and real situations in each specified area. Landsat satellite (TM & ETM+) images have been analyzed to study soil pollution (Exacerbation of salinity in the soil without the use of abandoned agricultural for a long time) at west of Baghdad city of Iraqi country for the years 1990, 2001 & 2007. All of the three scenes consist six bands (without the thermal band), changes are determined by applying supervised classification (Maximum Likelihood) technique. Then using Raster to Vector (R to V) Transform technique. ArcGIS 9.1 program is used to apply the supervised classification and the R to V transforms techniques in order to determine the results.
An adaptive nonlinear neural controller to reduce the nonlinear flutter in 2-D wing is proposed in the paper. The nonlinearities in the system come from the quasi steady aerodynamic model and torsional spring in pitch direction. Time domain simulations are used to examine the dynamic aero elastic instabilities of the system (e.g. the onset of flutter and limit cycle oscillation, LCO). The structure of the controller consists of two models :the modified Elman neural network (MENN) and the feed forward multi-layer Perceptron (MLP). The MENN model is trained with off-line and on-line stages to guarantee that the outputs of the model accurately represent the plunge and pitch motion of the wing and this neural model acts as the identifier. Th
... Show MoreProducts’ quality inspection is an important stage in every production route, in which the quality of the produced goods is estimated and compared with the desired specifications. With traditional inspection, the process rely on manual methods that generates various costs and large time consumption. On the contrary, today’s inspection systems that use modern techniques like computer vision, are more accurate and efficient. However, the amount of work needed to build a computer vision system based on classic techniques is relatively large, due to the issue of manually selecting and extracting features from digital images, which also produces labor costs for the system engineers.
 
... Show MoreSummary:
Background: life threating fungel disease is now a frequent substantial of the immunocomprimised host population . Candida infection has raised throughout the era of antibiotics & immunosuppressive chemotherapy.
Aim of study : to highlight the need for alternative immunprophlactic tool .Therefore the need to develop prophylactic or therapeutic immunolglobulin against candidacies Materials & Methods: 12.5 mg/ml. of Candida albicans proteinase enzyme was injected S/C into a group of five rabbits weighing 3 Kg. with complete Freund's adjuvant. Antisera was collected from the animals after 28 days . 0.2 ml of this antisera given l/V into two group of rabbits ; followed by 0.1 ml of the antiserum one of thses groups as
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreTrajectory tracking and vibration suppression are essential objectives in a flexible joint manipulator control. The flexible joint manipulator is an under-actuated system, in which the number of control actions is less than the degree of freedom to be controlled. It is very challenging to control the underactuated nonlinear system with two degree of freedom. This paper presents a hierarchical sliding mode control (HSMC) for a rotary flexible joint manipulator (RFJM). Firstly, the rotary flexible joint manipulator is modeled by two subsystems. Secondly, the sliding surfaces for both subsystems are constructed. Finally, the control action is designed based on the Lyapunov function. Computer simulation results demonstrate the effectiveness of
... Show More