Scorpions and spiders belong to the class Arachnida in phylum Arthropoda. Scorpions are easily distinguished by median eyes on obvious the center of the carapace and have one pair, and lateral eyes have 2-8 in some species. Scorpions do not have good eyesight so the median eyes have always been simple and they are more sensitive than the lateral pairs. They have anterior median eyes (AME) with narrow field of view and pairs of lateral eyes (LE) with more sensitivity and response to light. Family Buthidae have 2-6 lateral eyes in Compsobuthus Mesobuthus, Hottentotta, while Vaejovidae, Chactidae and Chaerilidae have 2 pairs of lateral eyes. In addition, 3 pairs are found in Orthochirus and Androctonus. Spiders have six eyes in family Pholicid
... Show MoreUsed in the study especially calibrated Erwa to determine the number of neighborhood or the Alayoshi number of bacteria in the count modeling and casting method dishes in addition to using the drop method yielded significant results for a match between the methods used ..
In this paper, the system of the power plant has been investigated as a special type of industrial systems, which has a significant role in improving societies since the electrical energy has entered all kinds of industries, and it is considered as the artery of modern life.
The aim of this research is to construct a programming system, which could be used to identify the most important failure modes that are occur in a steam type of power plants. Also the effects and reasons of each failure mode could be analyzed through the usage of this programming system reaching to the basic events (main reasons) that causing each failure mode. The construction of this system for FMEA is dependi
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreTwenty bacterial isolates were identified as Staphylococcus aureus collected from wounds and catheters related infections. A capsulated S. aureus isolate was chosen after performing serum soft agar test, for this study Neutropenic mice were challenged with capsulated S. aureus ,and the effect of G-CSF with or without moxifloxacin was studied. The results indicated that the addition of G-CSF to moxifloxacin therapy have a synergistic effect in the killing of the bacteria, while when each G-CSF and moxifloxacin were used seperately have a similar effect on bacterial killing. It was found that the moxifloxacin has the same activity as G_CSF but is less costly than the latter one.
Ovako Working Postures Analyzing System (OWAS) is a widely used method for studying awkward working postures in workplaces. This study with OWAS, analyzed working postures for manual material handling of laminations at stacking workstation for water pump assembly line in Electrical Industrial Company (EICO) / Baghdad. A computer program, WinOWAS, was used for the study. In real life workstation was found that more than 26% of the working postures observed were classified as either AC2 (slightly harmful), AC3 (distinctly harmful). Postures that needed to be corrected soon (AC3) and corresponding tasks, were identified. The most stressful tasks observed were grasping, handling, and positioning of the laminations from workers. The construct
... Show MoreHeuristic approaches are traditionally applied to find the optimal size and optimal location of Flexible AC Transmission Systems (FACTS) devices in power systems. Genetic Algorithm (GA) technique has been applied to solve power engineering optimization problems giving better results than classical methods. This paper shows the application of GA for optimal sizing and allocation of a Static Compensator (STATCOM) in a power system. STATCOM devices used to increase transmission systems capacity and enhance voltage stability by regulate the voltages at its terminal by controlling the amount of reactive power injected into or absorbed from the power system. IEEE 5-bus standard system is used as an example to illustrate the te
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More