The study was carried out to study the quality of 7 samples of imported frozen chicken that are available in locally markets. These samples were collected from Baghdad markets in June 2010. The results were showed that the all samples were not content the name of company and batch number one the labeling, while the microbial test refer to found contamination in all samples, but it in the limited of Iraqi standers specification for frozen chicken, also note Staphylococcus aureus in all samples, the samples C1 and C2 have Salmonella ohio, while not observe Coliform bacteria in all samples.
Making the data secure is more and more concerned in the communication era. This research is an attempt to make a more secured information message by using both encryption and steganography. The encryption phase is done with dynamic DNA complementary rules while DNA addition rules are done with secret key where both are based on the canny edge detection point of the cover image. The hiding phase is done after dividing the cover image into 8 blocks, the blocks that are used for hiding selected in reverse order exception the edge points. The experiments result shows that the method is reliable with high value in PSNR
Pavement crack and pothole identification are important tasks in transportation maintenance and road safety. This study offers a novel technique for automatic asphalt pavement crack and pothole detection which is based on image processing. Different types of cracks (transverse, longitudinal, alligator-type, and potholes) can be identified with such techniques. The goal of this research is to evaluate road surface damage by extracting cracks and potholes, categorizing them from images and videos, and comparing the manual and the automated methods. The proposed method was tested on 50 images. The results obtained from image processing showed that the proposed method can detect cracks and potholes and identify their severity levels wit
... Show MoreFor several applications, it is very important to have an edge detection technique matching human visual contour perception and less sensitive to noise. The edge detection algorithm describes in this paper based on the results obtained by Maximum a posteriori (MAP) and Maximum Entropy (ME) deblurring algorithms. The technique makes a trade-off between sharpening and smoothing the noisy image. One of the advantages of the described algorithm is less sensitive to noise than that given by Marr and Geuen techniques that considered to be the best edge detection algorithms in terms of matching human visual contour perception.
The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech
... Show MoreAbstract
The economic entities view about human resources has been changed from traditional view based on the resources as one of production factors required for achieving the activities that lead to create products in turn for financial substitute embodied in wages, toward contemporary view consider human resources the most important richest investments, a real source for continuing, developing, and achieving competitive advantage for the entity.
From that point, this research dealt with studying the subject of disclosing investment information of human resources in the financial reports of Iraqi economic entities. The research ended with stating a suggestive model for the
... Show MoreTo determine the relationship between herpes simplex virus 1, 2 and neurological disorders, sixty samples from patients with neurological diseases were collected (40 patients with Multiple sclerosis and 20 patients with Parkinson’s disease) all of whom attended both the Neurological science Hospital as well as the Neuropathology consultation Department in Baghdad Hospital In Iraq. The samples were collected in the time frame between November 2017 and April 2018. The ages of the patients that were investigated were between (17-76) years and compared to a control group consisting of 25 samples collected from apparently healthy individuals. All the studied groups were subjected to the measurement of anti-HSV 1, 2 IgG antibodies by the means
... Show Moreالغلط في القانون الانجليزي على انواع ثلاثة (غلط مشترك Common mistake ) يقع فيه الطرفان مع علم كل منهما بنية الآخر ويقبلها دون ان يشوب الاتفاق نقص او يعتريه تحفظ ، و(غلط من الجانبين Mutual mistake) يكون كل متعاقد واقعا في غلط فيما يتعلق بما قصده الآخر، فيقدم كل منهما عرضاً مخالفاً للآخر و(غلط من جانب واحدUnliteral mistake ) يقع فيه احد المتعاقدين فقط ويكون المتعاقد الآخر اما عالماً بالغلط او يفترض انه عالم به . فإذا دفع احد المتعاقدين
... Show Moreيأخذ هذا النوع من الدراسات أهميته في مجال الدراسات التاريخية لاسيما انه يقوم على أساس البحث والتقصي عن بعض الظواهر في المعاجم كونها تمثل المصدر الأساسي الذي وجدنا فيه الجزء الأعظم من تلك المادة المفقودة لكتاب النبات لابو حنيفة الدينوري.