Maintaining the quality of apricot fruits during storage is not an easy task due to the changes in their physical and chemical properties, so it is necessary to use less expensive, easy to apply, environmentally friendly, and safer preservatives to maintain the nutritional value of apricot. The damage to some fruits during storage can be a source of infection, which leads to the damage of healthy fruits more quickly, which requires building an intelligent model to detect damaged fruits. The aim of the research is to study the effect of immersing apricots in lemon juice once and sugar-water solution again on the quality properties of apricots, including sweetness, color, hardness, and water content. On the other hand, the YOLOv7 algorithm was used to detect healthy fruits and damaged areas using a camera. The results showed that sweetness increased with increasing immersion time in sugar-water solution to reach 22.1 Brix, while it decreased with increasing immersion time in lemon juice to 19.12 Brix. Also, hardness increased with increasing immersion time in sugar-water solution to reach 3.7 kg/cm2. The water content of apricots decreased with increasing immersion time in different immersion media from 77.14 g to 73.93 g. In addition, CIE-L*a*b levels increased with increasing immersion time in different immersion media. For the performance indicators of the YOLOv7 algorithm, precision of 84.5%, recall of 87%, F1 of 0.77, and [email protected] of 77.2 were obtained, respectively. Therefore, this study is expected to reduce the workload in post-harvest fruit processing and help in the rapid identification and detection of damaged fruits based on smart detection algorithms, thus improving sorting efficiency and reducing both waste and economic losses, which enhances smart agriculture technologies.
The game theory has been applied to all situations where agents’ (people or companies) actions are utility-maximizing, and the collaborative offshoot of game theory has proven to be a robust tool for creating effective collaboration strategies in a broad range of applications. In this paper first, we employ the Banzhaf values to show the potential cost to waste producers in the case of a cooperation and to reduce the overall costs of processing non-recyclable waste during cooperation between producers. Secondly, we propose an application of the methodology to study a case for five waste producers' waste management in the Al-Mahmudiya factory with the aim of displaying the potential cost to waste producers in case of cooperatio
... Show MoreAbstract
The current research aims to examine the effectiveness of a training program for children with autism and their mothers based on the Picture Exchange Communication System to confront some basic disorders in a sample of children with autism. The study sample was (16) children with autism and their mothers in the different centers in Taif city and Tabuk city. The researcher used the quasi-experimental approach, in which two groups were employed: an experimental group and a control group. Children aged ranged from (6-9) years old. In addition, it was used the following tools: a list of estimation of basic disorders for a child with autism between (6-9) years, and a training program for children with autism
... Show MoreThis study was conducted to study the cytogenetic effect of both alcoholic and water extracts of propolis on mice. Three different samples of propolis were collected from three different regions of Iraq (Najaf, Arbil and Baghdad) to be used in this study. The cytotoxic effect of two different doses of each extracted sample was measured by employing cytogenetic analysis which included (mitotic index (MI), chromosomal aberrations (CAs), micronucleus index (MN) and sperm abnormalities). Results showed that significant increase in MI and significant reduction in MN, CAs and sperm abnormalities percentage were seen after treatment with both alcoholic and water extract of the three samples when compared with negative control, and alcoholic extrac
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur
... Show MoreHumans knew writing and to blog motivated by the need for registration and documentation, and tried from the very beginning of research to find the most suitable material for this purpose, he used many different materials in form, nature, and composition, so it is written on the mud by the ancient Sumerian people in different forms and when the text is long Numbered as the pages of the book at the present time, this research will deal with the damage to manuscripts and then find ways to address them.
Shadow removal is crucial for robot and machine vision as the accuracy of object detection is greatly influenced by the uncertainty and ambiguity of the visual scene. In this paper, we introduce a new algorithm for shadow detection and removal based on different shapes, orientations, and spatial extents of Gaussian equations. Here, the contrast information of the visual scene is utilized for shadow detection and removal through five consecutive processing stages. In the first stage, contrast filtering is performed to obtain the contrast information of the image. The second stage involves a normalization process that suppresses noise and generates a balanced intensity at a specific position compared to the neighboring intensit
... Show MoreAbstract—In this study, we present the experimental results of ultra-wideband (UWB) imaging oriented for detecting small malignant breast tumors at an early stage. The technique is based on radar sensing, whereby tissues are differentiated based on the dielectric contrast between the disease and its surrounding healthy tissues. The image reconstruction algorithm referred to herein as the enhanced version of delay and sum (EDAS) algorithm is used to identify the malignant tissue in a cluttered environment and noisy data. The methods and procedures are tested using MRI-derived breast phantoms, and the results are compared with images obtained from classical DAS variant. Incorporating a new filtering technique and multiplication procedure, t
... Show MoreThere are many problems facing the economic entities as a result of its mass production &variation of its products , the matter which had increased the need & importance of cost accounting which is regarded a main tool for the managerial control.
The actual costing system is unable to meet the contemporary management needs ,so the Standard costing system appear to provide the management with required information to perform its functions by the best use& way.
This research aims to determine the standard cost for the direct material for oil extraction activity by applying it in the north oil company.