Maintaining the quality of apricot fruits during storage is not an easy task due to the changes in their physical and chemical properties, so it is necessary to use less expensive, easy to apply, environmentally friendly, and safer preservatives to maintain the nutritional value of apricot. The damage to some fruits during storage can be a source of infection, which leads to the damage of healthy fruits more quickly, which requires building an intelligent model to detect damaged fruits. The aim of the research is to study the effect of immersing apricots in lemon juice once and sugar-water solution again on the quality properties of apricots, including sweetness, color, hardness, and water content. On the other hand, the YOLOv7 algorithm was used to detect healthy fruits and damaged areas using a camera. The results showed that sweetness increased with increasing immersion time in sugar-water solution to reach 22.1 Brix, while it decreased with increasing immersion time in lemon juice to 19.12 Brix. Also, hardness increased with increasing immersion time in sugar-water solution to reach 3.7 kg/cm2. The water content of apricots decreased with increasing immersion time in different immersion media from 77.14 g to 73.93 g. In addition, CIE-L*a*b levels increased with increasing immersion time in different immersion media. For the performance indicators of the YOLOv7 algorithm, precision of 84.5%, recall of 87%, F1 of 0.77, and [email protected] of 77.2 were obtained, respectively. Therefore, this study is expected to reduce the workload in post-harvest fruit processing and help in the rapid identification and detection of damaged fruits based on smart detection algorithms, thus improving sorting efficiency and reducing both waste and economic losses, which enhances smart agriculture technologies.
Cyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show MoreAbstract: Under high-excitation irradiance conditions to induce fluorescence, the dependence of photobleaching of Coumarin 307 (C307) and acriflavine (ACF) laser dyes in liquid and solid phases have been studied. A cw LD laser source of 1 mW and 407 nm wavelength was used as an exciting source. For one hour exposure time, it was found that the solid dye samples suffer photobleaching more than the liquid dye samples. This is because in liquid solutions the dye molecules can circulate during the irradiation, while the photobleaching is a serious problem when the dye is incorporated into solid matrix and cannot circulate.
Construction contractors usually undertake multiple construction projects simultaneously. Such a situation involves sharing different types of resources, including monetary, equipment, and manpower, which may become a major challenge in many cases. In this study, the financial aspects of working on multiple projects at a time are addressed and investigated. The study considers dealing with financial shortages by proposing a multi-project scheduling optimization model for profit maximization, while minimizing the total project duration. Optimization genetic algorithm and finance-based scheduling are used to produce feasible schedules that balance the finance of activities at any time w
Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show MoreBacterial meningitis is a leading cause of illness and death worldwide. It is crucial for clinical and public health care, as well as disease control, to identify the meningitis-causing agent promptly. Between June 2021-February 2022, a total of 100 cerebrospinal fluid (CSF) and blood samples were collected from suspected cases of meningitis admitted to Raparin Paediatric Teaching Hospital, Erbil city-Iraq. Cytochemical, cultural, and biochemical tests were conducted, and confirmed by molecular techniques. Bacterial culture findings were positive in 7% of CSF samples and just one positive among blood samples. The most common pathogens found by cultural characteristics and VITEK 2 Compact System were Staphylococcus sciuri in two
... Show MoreTraffic classification is referred to as the task of categorizing traffic flows into application-aware classes such as chats, streaming, VoIP, etc. Most systems of network traffic identification are based on features. These features may be static signatures, port numbers, statistical characteristics, and so on. Current methods of data flow classification are effective, they still lack new inventive approaches to meet the needs of vital points such as real-time traffic classification, low power consumption, ), Central Processing Unit (CPU) utilization, etc. Our novel Fast Deep Packet Header Inspection (FDPHI) traffic classification proposal employs 1 Dimension Convolution Neural Network (1D-CNN) to automatically learn more representational c
... Show MoreThe research aimed: 1. Definition of family climate for the university students. 2. Definition of statistical significance of differences in family climate variable depending on the sex (males - females) and specialization (Scientific - humanity). 3. Definition of academic adjustment for university students. 4. Definition of correlation between climate and academic adjustment. The research sample formed of (300) male and female students by (150) male of scientific and humanitarian specialization and (150) female of scientific and humanitarian specialization randomly selected from the research community. To achieve the objectives of the research the researcher prepared a tool to measure family climate. And adopted the measure (Azzam 2010)
... Show More