Use of Surveillance cameras in houses and markets became common, that resulted to minimize theft and make it a difficult task because it let recording and viewing what is going around. The wide application of these cameras, pushed thieves to seek new ways for abolition of the surveillance system and digital recording of events, such as cutting the signal wire between the camera and Digital video recorder or changing the direction of the camera away from the focus spot or damaging the camera or steal the device which means the loss of the recorded media. This paper focuses on such abolitions and fixed it by suggesting a way to notify the administrator immediately and automatically by Email about any violation of the system using MATLAB, which allow fast action by the administrator to fix such tampering. The results show that selecting of threshold equal to two was fair in detecting motion and value of five, in case of changing the camera direction through testing of fast and slow motions.
Background: Since the invention of laser in 1960, lasers have been developed and approved in many fields. Lasers can now be regarded as practical tools with unique properties that have been utilized effectively in several applications in fields of medical and biological sciences.Objectives: The aim of the current study was to preparation of vaccines (live attenuated and killed) by irradiation of the bacteria by the low level diode laser.Methods: six bacterial isolates were isolated from human samples of diabetic foot infections, which used for preparation of vaccines. The experiment was conducted on fifteen adult male rabbits; they were divided into three groups with 5 rabbits each. Blood samples were collected from the marginal ear vein
... Show MoreThe increasing anti-bacterial drug resistance is one of the biggest challenges facing doctors around the globe, so finding alternative treatments is one of the ideal options to overcome this problem. The cruciferous family is one of the wealthiest plants worldwide because it contains the most important secondary metabolites, glucosinolates, known for their anti-microbial properties. The present study aimed to evaluate the anti-bacterial effect of glucosinolates (Sinigrin) against eight bacterial isolates (Staphylococcus aureus, Enterococcus faecalis, Escherichia coli, Klebsiella pneumoniae, Pseudomonas aeruginosa, Actinomyces, Proteus mirabilis and Streptococcus pneumoniae). The current study investigated six concentrations of pure
... Show MoreMicroalgae present much usefulness for antimicrobial research because of its enormous biodiversity and rapid growth rate. From this study results it is reaveled that Chlamydomonas reinhardtii were isolated from a pond of water in the province of Diwaniyah. The culture supernatants were obtained when extracted with methanol solvent. Antimicrobial activity of extracts was tested for pathogens, and the best inhibition zone obtained was against Candida albicans (32mm), S.aureus (15mm), and to E.coli (9mm). While it showed no effect against both S.epidermidis and Klebsiella spp. Biofilm was formed by all tested isolates with differences in its strength formation. The C. reinhardtii
... Show MoreValues are penetrating or interfering in the lives of individuals and groups and are connected to them in the sense of life itself, because they are closely linked to the motives of behavior, hopes and goals, and can be said that values are everything. The concept of values is one of the concepts that have received the attention of researchers from different disciplines. This has resulted in a kind of confusion and variation in use from one specialization to the other, and uses multiple uses within one specialization. Therefore, there is no uniform definition of values because they relate to individuals. Individuals differ in many things, such as perception,
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
The role of the ABC system in determining the costs of services in Iraqi banks
Knowing the Messengers, peace and blessings be upon them, and explaining their obligatory, impossible, and permissible qualities is a legal necessity. It is a rooting of the faith, a means of understanding the Sharia, and a preventer from falling into the scourge of denial and bad manners against them. Therefore, sound belief in their presence is a major reason for the validity of the faith in the aspect of divinity and unseen hearing. Studying the status of prophethood is an urgent necessity in a time in which knowledge is scarce and attachment to the Messenger, may God Almighty’s prayers and peace be upon him, his family, and his companions, is weak, and suspicions and ideas hostile to the faith abound until we begin to hear - unfort
... Show More