This study was conducted to investigate the presence of Staphylococcus aureus in the red and white meat available in local markets. They were selected ten samples of red and white meat randomly (Iraq, Saudi Arabia, Turkey, and Brazil) from different markets in Baghdad, and the results of reading the nutrition facts of media indication card showed that all models confirm to the Iraqi standard quality in terms of scanning all data of the media indication card, except for the birds of Bayader, where the date of expire & production date of the product was not mentioned. Also, the results of the study showed that there is no Staphylococcus aureus in local red and white meat as well as imported.
In this work, using GPS which has best accuracy that can be established set of GCPs, also two satellite images can be used, first with high resolution QuickBird, and second has low resolution Landsat image and topographic maps with 1:100,000 and 1:250,000 scales. The implementing of these factors (GPS, two satellite images, different scales for topographic maps, and set of GCPs) can be applying. In this study, must be divided this work into two parts geometric accuracy and informative accuracy investigation. The first part is showing geometric correction for two satellite images and maps.
The second part of the results is to demonstrate the features (how the features appearance) of topographic map or pictorial map (image map), Where i
The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.
Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.
To send any message text the sender converts message to ASCII c
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreThis research introduces a proposed hybrid Spam Filtering System (SFS) which consists of Ant Colony System (ACS), information gain (IG) and Naïve Bayesian (NB). The aim of the proposed hybrid spam filtering is to classify the e-mails with high accuracy. The hybrid spam filtering consists of three consequence stages. In the first stage, the information gain (IG) for each attributes (i.e. weight for each feature) is computed. Then, the Ant Colony System algorithm selects the best features that the most intrinsic correlated attributes in classification. Finally, the third stage is dedicated to classify the e-mail using Naïve Bayesian (NB) algorithm. The experiment is conducted on spambase dataset. The result shows that the accuracy of NB
... Show MoreThis study has applied digital image processing on three-dimensional C.T. images to detect and diagnose kidney diseases. Medical images of different cases of kidney diseases were compared with those of healthy cases. Four different kidneys disorders, such as stones, tumors (cancer), cysts, and renal fibrosis were considered in additional to healthy tissues. This method helps in differentiating between the healthy and diseased kidney tissues. It can detect tumors in its very early stages, before they grow large enough to be seen by the human eye. The method used for segmentation and texture analysis was the k-means with co-occurrence matrix. The k-means separates the healthy classes and the tumor classes, and the affected
... Show MoreThis work presents an investigation on the fabrication and characterization of Fe doped zeolitic imidazolate framework (ZIF-8) of 1:1 M ratio of Zn:Fe (Fe/Zn-ZIF-8) and adsorption performances of acquired materials. The synthesized Zn-ZIF-8, Fe-ZIF-8, and Fe/Zn-ZIF-8 materials were characterized for the phase structure, morphology, elemental analysis and surface area by using X-ray diffraction (XRD), Field emission scanning electron microscope (FESEM), Energy Dispersive X-Ray (EDX), and BET surface area, respectively. The results revealed the adsorption capacity was enhanced by incorporation of Fe into ZIF-8 structure. The CR dye adsorption capacities were 287, 219, and 412 mg/g for Zn-ZIF-8, Fe-ZIF-8, and Fe/Zn-ZIF-8 adsorbers, respectivel
... Show MoreThis paper interest to estimation the unknown parameters for generalized Rayleigh distribution model based on censored samples of singly type one . In this paper the probability density function for generalized Rayleigh is defined with its properties . The maximum likelihood estimator method is used to derive the point estimation for all unknown parameters based on iterative method , as Newton – Raphson method , then derive confidence interval estimation which based on Fisher information matrix . Finally , testing whether the current model ( GRD ) fits to a set of real data , then compute the survival function and hazard function for this real data.
In the latest years there has been a profound evolution in computer science and technology, which incorporated several fields. Under this evolution, Content Base Image Retrieval (CBIR) is among the image processing field. There are several image retrieval methods that can easily extract feature as a result of the image retrieval methods’ progresses. To the researchers, finding resourceful image retrieval devices has therefore become an extensive area of concern. Image retrieval technique refers to a system used to search and retrieve images from digital images’ huge database. In this paper, the author focuses on recommendation of a fresh method for retrieving image. For multi presentation of image in Convolutional Neural Network (CNN),
... Show MoreSteganography involves concealing information by embedding data within cover media and it can be categorized into two main domains: spatial and frequency. This paper presents two distinct methods. The first is operating in the spatial domain which utilizes the least significant bits (LSBs) to conceal a secret message. The second method is the functioning in the frequency domain which hides the secret message within the LSBs of the middle-frequency band of the discrete cosine transform (DCT) coefficients. These methods enhance obfuscation by utilizing two layers of randomness: random pixel embedding and random bit embedding within each pixel. Unlike other available methods that embed data in sequential order with a fixed amount.
... Show More