Use of Surveillance cameras in houses and markets became common, that resulted to minimize theft and make it a difficult task because it let recording and viewing what is going around. The wide application of these cameras, pushed thieves to seek new ways for abolition of the surveillance system and digital recording of events, such as cutting the signal wire between the camera and Digital video recorder or changing the direction of the camera away from the focus spot or damaging the camera or steal the device which means the loss of the recorded media. This paper focuses on such abolitions and fixed it by suggesting a way to notify the administrator immediately and automatically by Email about any violation of the system using MATLAB, which allow fast action by the administrator to fix such tampering. The results show that selecting of threshold equal to two was fair in detecting motion and value of five, in case of changing the camera direction through testing of fast and slow motions.
In this paper, we studied the spark corona discharge in tap and distillited waters. The results show the shape of cone that generated on the tip of capillary tube is different with conductivity of liquids. The blue glow appears at the end of capillary tube and the drop extends into a cone. In addition, the conducitivity is affected on the relationship between the appearance of the blue glow discharge with the applied voltage. The size of the cone decreases with an increase in applied voltage. The cone diameter at the base of capillary tube oscillates with period approximately 1 Sec. this oscillates in the cone diameters is due to the change distance between the liquid electrode and the surface of liquid. The intensity of spark corona dis
... Show MoreThis study evaluated the structural changes of enamel treated by the Regenerate system and carbon dioxide (CO2) laser against acid challenge. Thirty human enamel slabs were prepared and assigned into three groups: Group I: untreated (control); Group II: treated with the Regenerate system; and Group III exposed to CO2 laser. All specimens were subjected to an acid challenge (pH 4.5–7.0) for 14 days. Specimens were evaluated and compared at 120 points using five Raman microspectroscopic peaks; the phosphate vibrations ν1, ν2, ν3, and ν4 at 960, 433, 1029, and 579 cm−1, respectively, and the carbonate at 1070 cm−1, followed by Vickers microhardness test. The ratio of carbonate to phosphate was correlated to the equivalent mic
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreLaser-Induced Breakdown Spectroscopy (LIBS) has been documented as an Atomic Emission Spectroscopy (AES) technique, utilising laser-induced plasma, in order to analyse elements in materials (gases, liquids and solid). The Nd:YAG laser passively Q-switched at 1064nm and 9ns pulse duration focused by convex lens with focal length 100 mm to generates power density 5.5×1012 Mw/mm2 with optical spectrum in the range 320-740 nm. Four soil samples were brought from different northern region of Iraq, northern region (Beiji, Sherkat, Serjnar and Zerkary).
The soil of the Northern region of Beige, Sherkat, Serjnar and Zarkary has abundant ratios of the elements P [0.08, 0.09, 0.18, 0.18] and Ca [0.61, 0.15, 0.92, 0.92] while it lack of Si [0.0
The current research included (the evaluation of Information Security Management System on according to international standard (ISO / IEC 27001: 2013) in Iraqi Commission for Computers and Informatics), for the development of an administrative system for information security is considered a priority in the present day, and in the light of the organizations dependence on computers and information technology in work and communication with others. The international legitimacy (represented by the International Organization for standardization (ISO)) remains the basis for matching and commitment and the importance of the application of information Security Management System accordi
... Show MoreThis research has come out with that, function-based responsibility accounting system has harmful side – effects preventing it of achieving its controlling objective, that is, goal congruence, which are due to its un integrated measures, its focus on measuring measurable behaviors while neglecting behaviors that are hardly measured, and its dependence on standard operating procedures.
In addition, the system hypotheses and measures are designed to fit previous business environment, not the current environment.
The research has also concluded that the suggestive model, that is, activity-based responsibility accounting is designed to get ride of harmful side – effects of functi
... Show MoreA field experiment was conducted in Al-Yusufiya district - Al-Mahmoudiya district, Baghdad province during the winter season 2021, to study improving the efficiency and management of water use and the productivity of lettuce under different irrigation systems. The Nested-Factorial Experiments design was used, where the main plots include the first factor, irrigation levels (I1) 50%, (I2) 75%, (I3) 100, (I4) 125%, (I5) 150% ETpan. After depleting 35% of the available water and in terms of climatic data from the American Evaporative Basin, Class A. Then the main factor is divided into three replicates, and the coefficients of the second factor are distributed randomly within each replicate, which includes the irrigation system: surface drip i
... Show MoreThe study included selection six species of the fungi related to Pleurotus genus were evaluated for their ability to production of Pleurotin, one of them, Pleurotus ostreatus (P.11) was isolated and identified in the present study. Pleurotin was extracted with screening by Thin Layer Chromatography (TLC) and quantification High Performance Liquid Chromatography (HPLC). Cytotoxicity of Pleurotin extracted from P. ostreatus (P.11) grown in different sugar sources (galactose, mannitol, sucrose, dextrose and lactose) liquid media was test against three selected cancer cell lines, CaSki, MCF-7 and A549 addition to Human Non Cancer Fibroblast Cell Line (MRC-5). Pleurotin of P. ostreatus (P.11) grown in galactose induced the significant highest
... Show More