In the early 90s military operations and United Nations Special Commission “UNSCOM” teams have been destroyed the past Iraqi chemical program. Both operations led an extensive number of scattered remnants of contaminated areas. The quantities of hazardous materials, incomplete destructed materials, and toxic chemicals were sealed in two bunkers. Deficiency of appropriate destruction technology led to spreading the contamination around the storage site. This paper aims to introduce the environmental detection of the contamination in the storage site area using geospatial analysis technique. The environmental contamination level of nutrients and major ions such as sulphate (SO4), potassium (K), sodium (Na), magnesi
... Show MoreThe study is based on the selective binding ability of the drug compound procaine (PRO) on a surface imprinted with nylon 6 (N6) polymer. Physical characterization of the polymer template was performed by X-ray diffraction and DSC thermal analysis. The imprinted polymer showed a high adsorption capacity to trap procaine (237 µg/g) and excellent recognition ability with an imprinted factor equal to 3.2. The method was applied to an extraction column simulating a solid-phase extraction to separate the drug compound in the presence of tinoxicam and nucleosimide separately and in a mixture of them with a recovery rate more than the presence of tinoxicam and nucleosimide separately and in a mixture of them with a recovery rate of more t
... Show MoreMaking the data secure is more and more concerned in the communication era. This research is an attempt to make a more secured information message by using both encryption and steganography. The encryption phase is done with dynamic DNA complementary rules while DNA addition rules are done with secret key where both are based on the canny edge detection point of the cover image. The hiding phase is done after dividing the cover image into 8 blocks, the blocks that are used for hiding selected in reverse order exception the edge points. The experiments result shows that the method is reliable with high value in PSNR
The calculation. of the nuclear. charge. density. distributions. ρ(r) and root. mean. square. radius.( RMS ) by elastic. electron. scattering. of medium. mass. nuclei. such. as (90Zr, 92Mo) based. on the model. of the modified. shell. and the use of the probability. of occupation. on the surface. orbits. of level 2p, 2s eroding. shells. and 1g gaining. shells. The occupation probabilities of these states differ noticeably from the predictions of the SSM. We have found. an improvement. in the determination. of ground. charge. density. and this improvement. allow. more precise. identification. of (CDD) between. (92Mo- 90Zr) to illustrate the influence of the extra
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreDeepfake is a type of artificial intelligence used to create convincing images, audio, and video hoaxes and it concerns celebrities and everyone because they are easy to manufacture. Deepfake are hard to recognize by people and current approaches, especially high-quality ones. As a defense against Deepfake techniques, various methods to detect Deepfake in images have been suggested. Most of them had limitations, like only working with one face in an image. The face has to be facing forward, with both eyes and the mouth open, depending on what part of the face they worked on. Other than that, a few focus on the impact of pre-processing steps on the detection accuracy of the models. This paper introduces a framework design focused on this asp
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreThe shape dimensions and characteristics of pollen grains and seeds have importance in distinguish among species. Therefore, the present study included morphological characteristics of pollen grains and seeds for eight species belonging to eight genera of the family Brassicaceae and these species are: Alliaria petiolata (M.Bieb) Cavara et Grand, Aubrieta parviflora Boiss, Cardamine hirsuta L., Crambe orientalis L., Eromobium aegyptiacum (Spreng.) Schweinf.et Asch.ex Boiss., Parlatoria cakiloidea Boiss., Sterigmostemum sulphureum (Banksetsol.) Bornm. Neotorularia torulosa (Desf.) Hedge & J. Leonard. The pollen grains were studied in morphological and full measurements were taken, the study showed that the majority of the pollen grai
... Show More