Monthly water samples from three stations in Diwanya river at Diwanyia city were collected during December 1999 to June 2000. Variables from each stations were determined including ; temperature, pH ,dissolved oxygen, dissolved carbon dioxide , alkalinity ,total hardness, calcium ,magnesium , phosphate, nitrite, nitrate, chlorophyll-a , and total number of phytoplankton .The river considered as fresh water , alkaline ,very hard .The parameters recorded at different values from up and down stream.
In this study abundance and composition of zooplanktons in the Indus River Estuary was conducted to examine habitat characteristics and its impact on tiny organisms. Overall 30,656 individuals were identified and segregated into seven major groups including Copepods, Cnidarians, Decapods, Mollusk, Pisces, Amphipods and Chaetognaths. For better understanding they were further divided into eighteen planktonic categories. Among them Lucifer spp. comprises of 52.21% was the most abundant group with a peak appeared in March whereas Chaetognaths were rarely observed in the entire study period. Species diversity exhibited a mixed trend with the highest values (0.776) of dominance observed in spring (March). The results of Canonical Corresponden
... Show MoreIn the image processing’s field and computer vision it’s important to represent the image by its information. Image information comes from the image’s features that extracted from it using feature detection/extraction techniques and features description. Features in computer vision define informative data. For human eye its perfect to extract information from raw image, but computer cannot recognize image information. This is why various feature extraction techniques have been presented and progressed rapidly. This paper presents a general overview of the feature extraction categories for image.
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThe Comedy of patterns dramas that gave Representative possibilities of advanced functionality and wide being dependent on the diversity performance piece , which is intended to provoke laughter at the receiver, through the diversity of genres performing between dancing and singing and Albantomaim and other methods that have made them distinct from the species dramas other being enabled Representative in dealing with all roles across mature and adaptation of his tools of physical and vocal , as the comedy discusses the societal issues many have a factor of psychological and behind their platforms as a tool face is not directly give way to vent citizen injustice and disadvantages of humans and these conditions need to techniques of physic
... Show MoreBackground: Squamous cell carcinoma is a disease of elderly peopleand it is uncommon in people with less than 40 years old; however many literatures revealed that tumor developing in patients younger than forty years appears more aggressive at the time of diagnosis. The purpose of the present study was to focus on the clincopathological features of the oral SCC in different age groups. Material and methods: In this study thirty five cases of paraffin embedded tissue blocks of oral squamous cell carcinoma were studied. The age range was from 16 to 80 years. The clinicopathological data were recorded for evaluating the tumor characters according to age of patients. Results : The age was not significantly correlated to the clinicopathological
... Show MoreSome of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of select
... Show MoreImage classification is the process of finding common features in images from various classes and applying them to categorize and label them. The main problem of the image classification process is the abundance of images, the high complexity of the data, and the shortage of labeled data, presenting the key obstacles in image classification. The cornerstone of image classification is evaluating the convolutional features retrieved from deep learning models and training them with machine learning classifiers. This study proposes a new approach of “hybrid learning” by combining deep learning with machine learning for image classification based on convolutional feature extraction using the VGG-16 deep learning model and seven class
... Show More