Detecting dry eye from ocular surface videos based on deep learning
...Show More Authors
Fluidization process is widely used by a great assortment of industries worldwide and represents a trillion dollar industry [6]. They are currently used in separation, classification, drying and mixing of particles, chemical reactions and regeneration processes; one of these processes is the mass transfer from an immersed surface to a gas fluidized bed
This study was aimed to investigate the response surface methodology (RSM) to evaluate the effects of various experimental conditions on the removal of levofloxacin (LVX) from the aqueous solution by means of electrocoagulation (EC) technique with stainless steel electrodes. The EC process was achieved successfully with the efficiency of LVX removal of 90%. The results obtained from the regression analysis, showed that the data of experiential are better fitted to the polynomial model of second-order with the predicted correlation coefficient (pred. R2) of 0.723, adjusted correlation coefficient (Adj. R2) of 0.907 and correlation coefficient values (R2) of 0.952. This shows that the predicted models and experimental values are in go
... Show MoreThe present study aims at identifying the styles, procedures of Iraqi universities to avoid plagiarism and evaluate these steps, also to evaluate the form prepared by the Directory of Scientific Supervision and Evaluation, Ministry of Higher Education and Scientific Research. The study uses documentary style, 150 teachers in the following colleges (Education Ibn Rushd, Languages and Arts) in university of Baghdad whom already used the aforementioned list were the sample of the study and they asked to give their opinions about the list.The study consists of five sections, first one deals with general view, second explains plagiarism and its types, shapes and reasons,third tackles with ways of detecting plagiarism, its programs, consequences
... Show MoreMalware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreThe research aimed to identify “The impact of an instructional-learning design based on the brain- compatible model in systemic thinking among first intermediate grade female students in Mathematics”, in the day schools of the second Karkh Educational directorate.In order to achieve the research objective, the following null hypothesis was formulated:There is no statistically significant difference at the significance level (0.05) among the average scores of the experimental group students who will be taught by applying an (instructional- learning) design based to on the brain–compatible model and the average scores of the control group students who will be taught through the traditional method in the systemic thinking test.The resear
... Show MoreThe study aims at identifying the sources of information and explaining their role in e-learning from the viewpoint of the Iraqi college students. The researchers relied on the descriptive method of the survey method to collect data and know the point of view of undergraduate students from the Department of Information in the College of Arts / Tikrit University and the Department of Quranic Studies at the College of Arts / University of Baghdad. The questionnaire was used as an instrument of the study, the research sample is (120) students; each section has (60) male and female students. The study concluded that there are many types and forms of information sources that students receive through electronic educational platforms from text con
... Show More