An update of our research is the first to develop and reform the agricultural sector . and promoting production and productivity of this sector multi-sources , which is the management and beekeeping one source . Been applied to the style of beekeeping mobile promiscuous includes twentieth cell in the Iraqe project of mussiab . in which there exist a variety of crops and trees .
Experiment had proved successful and led to raise the level of npoduction of single Dell of the honey to 49 kg over the previous year and surpassed the average production percell in the province of Babylon , which the amount of 13.945 kg , another
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the road in all the sections of the country. Vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the developing system is consist of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show Moreچکیدهی بحث
به نظر میآید که عالم هستی ، بر مسألهی « حرکت» استوار دارد ، و روح ، همیشه دنبال دگرگونی و تکامل و برتری میگردد. حرکت ، همهی چیزها در عالم إمکان را در بر میگیرد. حرکت در بنیادهای فکر مولانا جای مهمی دارد .اشعار مولانا مقدار زیادی از پویایی و حرکت برخوردارست، و از آنجایی که فعل ، عنصر تکانبخش جمله ، و کانون دلالت است ، ترجیح دادیم - علاوه بر دیگر عنا
... Show MoreA field experiment was conducted during the autumn of 2021 at the Agricultural Research Department station / Abu Ghraib to evaluate the soil moisture, water potential distribution, and growth factors of maize crops under alternating and constant partial drip irrigation methods. In the experiment, two irrigation systems were used, surface drip irrigation (DI) and subsurface irrigation (SD); under each irrigation system, five irrigation methods were: conventional irrigation (CI), and 75 and 50% of the amount of water of CI of each of the alternating partial irrigation APRI75 and APRI50 and the constant partial irrigation FPRI75 and FPRI50 respectively. The results showed that the water depth for conventional irrigation (C1) was 658.3
... Show MoreOne of the common geotechnical problems is the construction on soft soil and the improvement of its geotechnical properties to meet the design requirements. A stone column is one of the well-known techniques used to improve the geotechnical properties of soft soils. Sometimes thick layers of soft soil imposed the designer to use floating stone columns for improvement of such soil; in this case, the designer will be lost the end bearing of the stone column. In this study, the effects of several patterns of floating stone columns distribution under footing on the bearing capacity of soil and the distribution of excess porewater pressure are investigated. The soft soil used in this study has a very low undrained shear strength (cu) of
... Show More