After the year 2003 terrorist attacks knock Baghdad city capital of Iraq using bomb explosion various, shook the nation, and made public resident of Baghdad aware of the need for better ways to protect occupants, assets, and buildings cause the terrorist gangs adopt style burst of blast to injury vulnerability a wider range form, and many structures will suffer damage from air blast when the overpressure concomitant the blast wave, (i.e., the excess over the atmospheric pressure 14.7 pounds per square inch at standard sea level conditions are about one-half pound per square inch or more(
to attainment injury. Then, the distance to which this overpressure level will extend depends primarily on the energy yield (§1.20) of the burst of blast. Accordingly, must been have adopted a changing philosophy to provide appropriate and effective protection for preservation of psyche and building occupants, by establishment of a protected perimeter and the design of a debris mitigating facade, the isolation of internal explosive threats that may to dodge detection through the screening stations or may enter the public spaces prior to screening and the protection of the emergency evacuation, rescue and recovery systems. By reason of this above-mentioned, the study simple contribution of determined phenomena risk containment. Moreover, in this study may be applied remote sensing (RS) and geographic information system (GIS) techniques to estimation the blast wave overpressure of bomb explosive effecters for damage that building of materials (i.e., facade, building glass, secondary of roof, fashioning tools and furniture), and how avoid this problem, therefore, selection justice ministry of Iraq building in Salehyiea region at Baghdad city, it destroyed at 28/10/2009 by motocar bombs explosion.
المقال منشور على موقع مجلة الفورين بوليسي الأميركية (Foreign Policy) على الانترنت في 27 أيلول/سبتمبر 2019. يُشير مصطلح العزل (Impeachment) في الثقافة السياسية الأميركية إلى مجموعة الإجراءات التي يتم بموجبها عزل الرئيس من منصبه، وهذه الإجراءات هي بمثابة عملية طويلة تجري داخل الكونجرس، وتتم وفقاً لخطوات يؤدي فيها كل من مجلسيّ النواب والشيوخ دوراَ. ولا يعني القيام بهذه الإجراءات أن يتم عزل الرئيس، فقد تتم إ
... Show MoreLet G be a graph, each edge e of which is given a weight w(e). The shortest path problem is a path of minimum weight connecting two specified vertices a and b, and from it we have a pre-topology. Furthermore, we study the restriction and separators in pre-topology generated by the shortest path problems. Finally, we study the rate of liaison in pre-topology between two subgraphs. It is formally shown that the new distance measure is a metric
Abstract— The growing use of digital technologies across various sectors and daily activities has made handwriting recognition a popular research topic. Despite the continued relevance of handwriting, people still require the conversion of handwritten copies into digital versions that can be stored and shared digitally. Handwriting recognition involves the computer's strength to identify and understand legible handwriting input data from various sources, including document, photo-graphs and others. Handwriting recognition pose a complexity challenge due to the diversity in handwriting styles among different individuals especially in real time applications. In this paper, an automatic system was designed to handwriting recognition
... Show MoreThis paper presents an approach to license plate localization and recognition. A proposed method is designed to control the opening of door gate based on the recognition of the license plates number in Iraq. In general the system consists of four stages; Image capturing, License plate cropping, character segmentation and character recognition. In the first stage, the vehicle photo is taken from standard camera placed on the door gate with a specific distance from the front of vehicle to be processed by our system. Then, the detection method searches for the matching of the license plate in the image with a standard plate. The segmentation stage is performed by is using edge detection. Then character recognition, done by comparing with templ
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreAbstract Since unmethylated CpG motifs are more common in DNA from bacteria than vertebrates, and the unmethylated CpG motif has recently been reported to have stimulatory effects on lymphocytes, we speculated that bacterial DNA may induce inflammation in the urinary tract. To determine the role of bacterial DNA in lower UTI, we intraurethrally injected prokaryotic DNA (extracted from E. coli) in white mice and performed histopathological study for the kidneys and urinary bladders, 24 h after the exposure. The results showed infiltration of inflammatory cells, shrinkage of glomerulus and increase the capsular space, as well as edema formation in kidney tissues. Moreover, urinary bladder sections showed infiltration of inflammatory cells.
... Show MoreBeen Antkhav three isolates of soil classified as follows: Bacillus G3 consists of spores, G12, G27 led Pal NTG treatment to kill part of the cells of the three isolates varying degrees treatment also led to mutations urged resistance to streptomycin and rifampicin and double mutations
Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
After the outbreak of COVID-19, immediately it converted from epidemic to pandemic. Radiologic images of CT and X-ray have been widely used to detect COVID-19 disease through observing infrahilar opacity in the lungs. Deep learning has gained popularity in diagnosing many health diseases including COVID-19 and its rapid spreading necessitates the adoption of deep learning in identifying COVID-19 cases. In this study, a deep learning model, based on some principles has been proposed for automatic detection of COVID-19 from X-ray images. The SimpNet architecture has been adopted in our study and trained with X-ray images. The model was evaluated on both binary (COVID-19 and No-findings) classification and multi-class (COVID-19, No-findings
... Show More