This work bases on encouraging a generous and conceivable estimation for modified an algorithm for vehicle travel times on a highway from the eliminated traffic information using set aside camera image groupings. The strategy for the assessment of vehicle travel times relies upon the distinctive verification of traffic state. The particular vehicle velocities are gotten from acknowledged vehicle positions in two persistent images by working out the distance covered all through elapsed past time doing mollification between the removed traffic flow data and cultivating a plan to unequivocally predict vehicle travel times. Erbil road data base is used to recognize road locales around road segments which are projected into the commended camera images and later distinguished vehicles are assigned to the looking at route segment so instantaneous and current velocities are calculated. All data were effectively processed and visualized using both MATLAB and Python programming language and its libraries.
Irinotecan (CPT-11) is a semisynthetic derivative of the antineoplastic agent camptothecin used in a wide range as an anti-cancer agent in many solid tumors because of its cytotoxic effect through the interaction with the topoisomerase I enzyme. The major limiting factors for irinotecan treatment are its association with potentially life-threatening toxicities including neutropenia and acute or delayed-type diarrhea, results from distinct interindividual and interethnic variability due to gene polymorphism.
This is a cross sectional pharmacogentics study was conducted on 25 cancer patients to estimate the prevalence of UGT1A1*93 and ABCC5 allele single nucleotide polymorphism (SNP) in Iraqi cancer patients treated with irinotecan
... Show MoreActive learning is a teaching method that involves students actively participating in activities, exercises, and projects within a rich and diverse educational environment. The teacher plays a role in encouraging students to take responsibility for their own education under their scientific and pedagogical supervision and motivates them to achieve ambitious educational goals that focus on developing an integrated personality for today’s students and tomorrow’s leaders. It is important to understand the impact of two proposed strategies based on active learning on the academic performance of first-class intermediate students in computer subjects and their social intelligence. The research sample was intentionally selected, consis
... Show MoreThis paper aims to study the chemical degradation of Brilliant Green in water via photo-Fenton (H2O2/Fe2+/UV) and Fenton (H2O2/Fe2+) reaction. Fe- B nano particles are applied as incrustation in the inner wall surface of reactor. The data form X- Ray diffraction (XRD) analysis that Fe- B nanocomposite catalyst consist mainly of SiO2 (quartz) and Fe2O3 (hematite) crystallites. B.G dye degradation is estimated to discover the catalytic action of Fe- B synthesized surface in the presence of UVC light and hydrogen peroxide. B.G dye solution with 10 ppm primary concentration is reduced by 99.9% under the later parameter 2ml H2O2, pH= 7, temperature =25°C within 10 min. It is clear that pH of the solution affects the photo- catalytic degradation
... Show MoreIn this paper, Pentacene based-organic field effect transistors (OFETs) by using different layers (monolayer, bilayer and trilayer) for three different gate insulators (ZrO2, PVA and CYEPL) were studied its current–voltage (I-V) characteristics by using the gradual-channel approximation model. The device exhibits a typical output curve of a field-effect transistor (FET). Source-drain voltage (Vds) was also investigated to study the effects of gate dielectric on electrical performance for OFET. The effect of capacitance semiconductor in performance OFETs was considered. The values of current and transconductance which calculated using MATLAB simulation. It exhibited a value of current increase with increasing source-drain voltage.
The plethora of the emerged radio frequency applications makes the frequency spectrum crowded by many applications and hence the ability to detect specific application’s frequency without distortion is a difficult task to achieve.
The goal is to achieve a method to mitigate the highest interferer power in the frequency spectrum in order to eliminate the distortion.
This paper presents the application of the proposed tunable 6th-order notch filter on Ultra-Wideband (UWB) Complementary Metal-Oxide-Semiconductor (CMOS) Low Noise
The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show MoreRetreatment Efficacy of Continuous Rotation Versus Reciprocation Kinematic Movements in Removing Gutta-Percha with Calcium Silicate-Based Sealer: SEM Study, Raghad Noori Nawaf*, Ra
This study proposed using color components as artificial intelligence (AI) input to predict milk moisture and fat contents. In this sense, an adaptive neuro‐fuzzy inference system (ANFIS) was applied to milk processed by moderate electrical field‐based non‐thermal (NP) and conventional pasteurization (CP). The differences between predicted and experimental data were not significant (
DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show More