Regular sampling for six months from January to July 2012 were taken in small, shallow, perennial, standing ponds near the Greater Zab River, Gwer district, Erbil. A variety of physicochemical parameters were determined. Air and water temperature were falling between 15.2 - 34.7 ? C and 15.5 and 26.5 ?C. The waters are neutral (pH 7.38-8.27), hard, alkaline, salty, high in TDS and EC (892-966?S/cm, and rich in nutrients (NO3: 2.1-4.1mg/l, PO4: 0.33-0.62 mg / l , SO4: 24.7-80.2 mg / l ). The attention fixed on a filamentous blue- green algae Glaucospira Lagerheim, 1982) which is new to Iraqi flora. It is a filament (trichome), solitary, pale or yellowish blue – green, without sheath, Screw like coiled, motile, some of them are actively motile. In this study nine species were identified, classified and described with their original and hand drawing, photo vis.; Glaucospira sp.: syn. Spirulina abreviata Lemm. ex Kleb. and Lemm. , G. agilissima Lag., G. laxissima G.S.West syn.: Spirulina laxissima f. major Des., Glaucospira sp. syn.: Spirulina tenuior Lag.,Glaucospira sp. Syn.: Spirulina corakiana Playf., Glaucospira sp.syn.: Sprulina nodosa Scham. Glaucospira sp. syn.: Spilurina baltica Mart.,Glaucospira sp. Syn.: Spirulina magnifica Cop. And Glaucospira sp. syn.: Spirulina subtilissima Mostly they are from Spiralina Turpin ex Gomont.
Skull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither non-brain tissues nor
... Show MoreIn this paper we describe several different training algorithms for feed forward neural networks(FFNN). In all of these algorithms we use the gradient of the performance function, energy function, to determine how to adjust the weights such that the performance function is minimized, where the back propagation algorithm has been used to increase the speed of training. The above algorithms have a variety of different computation and thus different type of form of search direction and storage requirements, however non of the above algorithms has a global properties which suited to all problems.
This paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.
Equilibrium adsorption isotherm for the removal of trifluralin from aqueous solutions using ? –alumina clay has been studied. The result shows that the isotherms were S3 according Giels classification. The effects of various experimental parameters such as contact time, adsorbent dosage, effect of pH and temperature of trifluralin on the adsorption capacities have been investigated. The adsorption isotherms were obtained by obeying freundlich adsorption isotherm with (R2 = 0.91249-0.8149). The thermodynamic parameters have been calculated by using the adsorption process at five different temperature, the values of ?H, ?G and ?S were (_1.0625) kj. mol-1, (7.628 - 7.831) kj.mol-1 and (_2.7966 - _2.9162) kg.
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreVehicular ad hoc network (VANET) is a distinctive form of Mobile Ad hoc Network (MANET) that has attracted increasing research attention recently. The purpose of this study is to comprehensively investigate the elements constituting a VANET system and to address several challenges that have to be overcome to enable a reliable wireless communications within a vehicular environment. Furthermore, the study undertakes a survey of the taxonomy of existing VANET routing protocols, with particular emphasis on the strengths and limitations of these protocols in order to help solve VANET routing issues. Moreover, as mobile users demand constant network access regardless of their location, this study seeks to evaluate various mobility models for vehi
... Show MoreIn this paper, we define some generalizations of topological group namely -topological group, -topological group and -topological group with illustrative examples. Also, we define grill topological group with respect to a grill. Later, we deliberate the quotient on generalizations of topological group in particular -topological group. Moreover, we model a robotic system which relays on the quotient of -topological group.
The relation between faithful, finitely generated, separated acts and the one-to-one operators was investigated, and the associated S-act of coshT and its attributes have been examined. In this paper, we proved for any bounded Linear operators T, VcoshT is faithful and separated S-act, and if a Banach space V is finite-dimensional, VcoshT is infinitely generated.
The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show More