In this work, animal bones with different shapes and sizes were used to study the characteristics of the ground penetrating Radar system wares reflected by these bones. These bones were buried underground in different depths and surrounding media. The resulting data showed that the detection of buried bones with the GPR technology is highly dependent upon the surrounding media that the bones were buried in. Humidity is the main source of signal loss in such application because humidity results in low signal-to-noise ratio which leads to inability to distinguish between the signal reflected by bones from that reflected by the dopes in the media such as rock .
Zinc oxide (ZnO) transparent thin films with different oxygen flow rates (0.5, 1.0, and 1.5)Litter/min. were prepared by thermal evaporation technique on glass substrate at a temperature of 200℃ with rate (10±2)nm sec-1, The crystallinity and structure of these films were analyzed by X-ray diffraction (XRD). It exhibits a polycrystalline hexagonal wurtzite structure and the preferred orientation along (002) plane. The Optical properties of ZnO were determined through the optical transmission method using ulta violet–Visible spectrophotometer with in wave length (300-1100)nm. The optical transmittance of the ZnO films increases from 75% to 85% with increase flow rate of O2, and the optical band gap of ZnO
... Show MoreIn this research an Artificial Neural Network (ANN) technique was applied for the prediction of Ryznar Index (RI) of the flowing water from WTPs in Al-Karakh side (left side) in Baghdad city for year 2013. Three models (ANN1, ANN2 and ANN3) have been developed and tested using data from Baghdad Mayoralty (Amanat Baghdad) including drinking water quality for the period 2004 to 2013. The results indicate that it is quite possible to use an artificial neural networks in predicting the stability index (RI) with a good degree of accuracy. Where ANN 2 model could be used to predict RI for the effluents from Al-Karakh, Al-Qadisiya and Al-Karama WTPs as the highest correlation coefficient were obtained 92.4, 82.9 and 79.1% respe
... Show MoreMost Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Abstract:
Thanks for people's God who brought the great book, prays and peace for
his prophet "Mohammad" the master of missioners to all people.
Allah created human being in it's best way and give him a soul thus ,
he will be a human with faith that has movement and life and the centre of his
soul is the sense which differentiate human from other animals. This
sensation generated from different senses that made the soul.
God had given him a protected heart, talkative tounge and clear seeing
to understand with consideration, so he will prevent himself of falling in wrong
by thinking and situation that he will pass by.
The significance and probability of sensation had talken our attention in
Qur'an . Hence
<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show MoreA robust and sensitive analytical method is presented for the extraction and determination of six pharmaceuticals in freshwater sediments.
A total of 50 fertile human hydatid cases {33(66%) females and (34%) males}, obtained from Al-Ramadi public Hospital during the period from December 2003 to July 2004 were examined to study any bacterial infections. The specimens were obtained from hydatid fluid and then cultured on appropriate culture media to distinguish some species of bacteria which resulted in obtaining: Staphylococcus aureus (18%), Pseudomonas aeruginosa(12%), Escherichia coli(6%) and Streptococcus pneumonia (4%). These bacteria were confirmed by isolation from interacyst fluid and blood culture technique. The possible routs of infection may be through blood, biliary ducts and bronchioles .The selectivity permeable of the cyst wall may be absent and that may allow
... Show MoreCarbon Nanopowder was fabricated by arc discharge technique at deposition pressure of 10-5 mbar Argon gas on glass substrates. The prepared carbon nano- powder was collected from chamber and purified with nitric acid at 323K .The morphology and crystalline structure of the prepared powder was examined by X-Ray Diffraction (XRD), Atomic Force Microscope (AFM), and Scanning Electron Microscope (SEM). XRD spectrums showed that the powder exhibits amorphous structure and after purification, the powder showed hexagonal structure with a preferential orientation along(002) direction ,where AFM and SEM gave very compatible estimation on the grain size and shape of the nanopowder.