Preferred Language
Articles
/
0xhZ45YBVTCNdQwCIIiP
Analysis of the effectiveness of natural treatments for preserving apricots and the YOLOv7 application for early damage detection
...Show More Authors

Maintaining the quality of apricot fruits during storage is not an easy task due to the changes in their physical and chemical properties, so it is necessary to use less expensive, easy to apply, environmentally friendly, and safer preservatives to maintain the nutritional value of apricot. The damage to some fruits during storage can be a source of infection, which leads to the damage of healthy fruits more quickly, which requires building an intelligent model to detect damaged fruits. The aim of the research is to study the effect of immersing apricots in lemon juice once and sugar-water solution again on the quality properties of apricots, including sweetness, color, hardness, and water content. On the other hand, the YOLOv7 algorithm was used to detect healthy fruits and damaged areas using a camera. The results showed that sweetness increased with increasing immersion time in sugar-water solution to reach 22.1 Brix, while it decreased with increasing immersion time in lemon juice to 19.12 Brix. Also, hardness increased with increasing immersion time in sugar-water solution to reach 3.7 kg/cm2. The water content of apricots decreased with increasing immersion time in different immersion media from 77.14 g to 73.93 g. In addition, CIE-L*a*b levels increased with increasing immersion time in different immersion media. For the performance indicators of the YOLOv7 algorithm, precision of 84.5%, recall of 87%, F1 of 0.77, and [email protected] of 77.2 were obtained, respectively. Therefore, this study is expected to reduce the workload in post-harvest fruit processing and help in the rapid identification and detection of damaged fruits based on smart detection algorithms, thus improving sorting efficiency and reducing both waste and economic losses, which enhances smart agriculture technologies.

Crossref
View Publication
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
An Application of the Banzhaf Values for Cooperating Among Producers of Waste Processing in the Al-Mahmudiya Factory
...Show More Authors

     The game theory has been applied to all situations where agents’ (people or companies) actions are utility-maximizing, and the collaborative offshoot of game theory has proven to be a robust tool for creating effective collaboration strategies in a broad range of applications. In this paper first, we employ the Banzhaf values to show the potential cost to waste producers in the case of a cooperation and to reduce the overall costs of processing non-recyclable waste during cooperation between producers. Secondly, we propose an application of the methodology to study a case for five waste producers' waste management in the Al-Mahmudiya factory with the aim of displaying the potential cost to waste producers in case of cooperatio

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of a Training Program for Children with Autism and their Mothers Based on the Picture Exchange Commination System to Confront Some of Basic Disorders for these Children
...Show More Authors

Abstract

The current research aims to examine the effectiveness of a training program for children with autism and their mothers based on the Picture Exchange Communication System to confront some basic disorders in a sample of children with autism. The study sample was (16) children with autism and their mothers in the different centers in Taif city and Tabuk city. The researcher used the quasi-experimental approach, in which two groups were employed: an experimental group and a control group. Children aged ranged from (6-9) years old. In addition, it was used the following tools: a list of estimation of basic disorders for a child with autism between (6-9) years, and a training program for children with autism

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 19 2024
Journal Name
Aip Conference Proceedings
CT scan and deep learning for COVID-19 detection
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Current Research In Microbiology And Biotechnology
Cytogenetic Analysis for the Effect of Alcoholic and Water Extracts of Iraqi Propolis in Mice
...Show More Authors

This study was conducted to study the cytogenetic effect of both alcoholic and water extracts of propolis on mice. Three different samples of propolis were collected from three different regions of Iraq (Najaf, Arbil and Baghdad) to be used in this study. The cytotoxic effect of two different doses of each extracted sample was measured by employing cytogenetic analysis which included (mitotic index (MI), chromosomal aberrations (CAs), micronucleus index (MN) and sperm abnormalities). Results showed that significant increase in MI and significant reduction in MN, CAs and sperm abnormalities percentage were seen after treatment with both alcoholic and water extract of the three samples when compared with negative control, and alcoholic extrac

... Show More
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Sun Mar 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Security For Three-Tiered Web Application
...Show More Authors

          Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research).  This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Stances on the damage to manuscripts and ways to address them
...Show More Authors

Humans knew writing and to blog motivated by the need for registration and documentation, and tried from the very beginning of research to find the most suitable material for this purpose, he used many different materials in form, nature, and composition, so it is written on the mud by the ancient Sumerian people in different forms and when the text is long Numbered as the pages of the book at the present time, this research will deal with the damage to manuscripts and then find ways to address them.

View Publication Preview PDF
Publication Date
Wed May 01 2024
Journal Name
Scientific Visualization
Shadow Detection and Elimination for Robot and Machine Vision Applications
...Show More Authors

Shadow removal is crucial for robot and machine vision as the accuracy of object detection is greatly influenced by the uncertainty and ambiguity of the visual scene. In this paper, we introduce a new algorithm for shadow detection and removal based on different shapes, orientations, and spatial extents of Gaussian equations. Here, the contrast information of the visual scene is utilized for shadow detection and removal through five consecutive processing stages. In the first stage, contrast filtering is performed to obtain the contrast information of the image. The second stage involves a normalization process that suppresses noise and generates a balanced intensity at a specific position compared to the neighboring intensit

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jan 06 2021
Journal Name
Pierm
ULTRA-WIDEBAND FEATURING ENHANCED DELAY AND SUM ALGORITHM AND ORIENTED FOR DETECTING EARLY STAGE BREAST CANCER
...Show More Authors

Abstract—In this study, we present the experimental results of ultra-wideband (UWB) imaging oriented for detecting small malignant breast tumors at an early stage. The technique is based on radar sensing, whereby tissues are differentiated based on the dielectric contrast between the disease and its surrounding healthy tissues. The image reconstruction algorithm referred to herein as the enhanced version of delay and sum (EDAS) algorithm is used to identify the malignant tissue in a cluttered environment and noisy data. The methods and procedures are tested using MRI-derived breast phantoms, and the results are compared with images obtained from classical DAS variant. Incorporating a new filtering technique and multiplication procedure, t

... Show More
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Determination of the standard cost of raw materials for the activity of extracting crude oil and gas by application in the North Oil Company
...Show More Authors

There are many problems facing the economic entities  as a result of its mass production &variation of its products  , the matter which had  increased the need & importance of cost accounting which is regarded a main tool for the managerial control.

The actual costing system is unable to meet the contemporary management needs ,so the Standard costing system appear to provide the management  with required information to perform its functions by the best use& way.

This research aims to determine  the standard cost for the  direct material for oil extraction activity by applying it in the north oil company.

View Publication Preview PDF
Crossref