Monthly water samples from three stations in Diwanya river at Diwanyia city were collected during December 1999 to June 2000. Variables from each stations were determined including ; temperature, pH ,dissolved oxygen, dissolved carbon dioxide , alkalinity ,total hardness, calcium ,magnesium , phosphate, nitrite, nitrate, chlorophyll-a , and total number of phytoplankton .The river considered as fresh water , alkaline ,very hard .The parameters recorded at different values from up and down stream.
In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i
... Show MoreConcentrations of heavy metals (Copper Cu, Iron Fe, Manganese Mn, Cadmium Cd, and Lead Pb) have been studied in river crab Sesarma boulengeri (Outer part of the shield and interior tissues) which caught from two stations in Shatt Al – Arab river (Salhia and Aldeir areas). Elements concentrations were measured by Flame Atomic Absorption Spectrophotometer, concentration of heavy metals in the internal tissues was higher than in the outer shield in both of the stations with the highest value of the elements was to iron 95.21 mg\ kg during the spring as well as copper was 55 mg\kg and manganese was 39.09 mg\kg. The study showed the presence of seasonal changes in the studied heavy metals concentrations values in the tissues of river crab;
... Show MoreIn this study abundance and composition of zooplanktons in the Indus River Estuary was conducted to examine habitat characteristics and its impact on tiny organisms. Overall 30,656 individuals were identified and segregated into seven major groups including Copepods, Cnidarians, Decapods, Mollusk, Pisces, Amphipods and Chaetognaths. For better understanding they were further divided into eighteen planktonic categories. Among them Lucifer spp. comprises of 52.21% was the most abundant group with a peak appeared in March whereas Chaetognaths were rarely observed in the entire study period. Species diversity exhibited a mixed trend with the highest values (0.776) of dominance observed in spring (March). The results of Canonical Corresponden
... Show MoreThe estimation of recharge to ground water is the important basics to improve the use of ground water with other available resources, and to save ground water resource from depletion, especially when using large quantity of ground water during a long time such as for agricultural purposes. Al-Wand River Basin in Iraq suffers from water shortage of its requirement of Blajo–Al-Wand Project, and to cover this shortage, the ground water plays a good role to overcome this problem. In this study, three methods were used to estimate the recharge and ground water storage for Al-Wand Basin, these methods are: Water Table Fluctuation (WTF), Water Balance of Climatic for Basin, and Water Table Balance for Basin. The results showe
... Show MoreSome of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of select
... Show More This research aims to harmonize contemporary and traditional clothes, also expenses and savings. It is done by recycling evening clothes into Clothes with traditional features. The study followed descriptive explanatory approach. The sample consisted of seven dresses, as well as 208 female participants from Makkah Al-Mukarramah province, the age range was between 21 and 65 years old. An electronic questionnaire was distributed and the stability and reliability of the internal consistency were measured.
The research resulted in the ability to recycle evening dresses into modern clothes with traditional characteristics. It also confirmed that the reason of wearing traditional clothes is spirituality of the month of Ramadan. Addi
In the image processing’s field and computer vision it’s important to represent the image by its information. Image information comes from the image’s features that extracted from it using feature detection/extraction techniques and features description. Features in computer vision define informative data. For human eye its perfect to extract information from raw image, but computer cannot recognize image information. This is why various feature extraction techniques have been presented and progressed rapidly. This paper presents a general overview of the feature extraction categories for image.
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show More