During the syrvey on natural enemies of whiteflies in Iraq, the following. predators were recorded.
The development in the presentation and presentation of the service in order to distinguish them from the same, was one of the most important reasons to choose the current issue to upgrade the level of service, especially in the Iraqi restaurant sector, which has become today of the important sectors successful. The problem of research was to try to answer a range of questions: to what extent are Iraqi restaurants interested in physical service factors? Do Iraqi restaurants apply physical factors in a way that leads to customer satisfaction? Are Iraqi restaurants interested in the satisfaction of their customers? The objective of the current research is to try to determine the extent to which the
... Show MoreSurvivin, a member of inhibitor of apoptosis family is increasingly used as a target for cancer therapy design because it has a key role in cell growth and inhibition of cell apoptosis. Also it can be used as a biomarker for targeting cancer because it is found in almost all cancer but not normal cells. Our strategy was to design (computationally) a molecule to be used as survivin inhibitor. This molecule was named lead10 and was used furthermore to find (virtually) existing drugs with a good survivin inhibition activity.
This research examines the phonological adaptation of pure vowels in English loanwords in Iraqi Arabic (IA). Unlike previous small-scale studies, the present study collected 346 loanwords through document review and self-observation, and then analyzed them using quantitative content analysis to identify the patterns of pure vowel adaptation involved in incorporating English loanwords into IA. The content analysis findings showed that most pure vowel adaptations in English loanwords in IA follow systematic patterns and may thus be attributed to specific characteristics of both L1 and L2 phonological systems. Specifically, the findings suggest that the IA output forms typically preserve the features of the input pure vowel to the maxi
... Show MoreCollective C2 transitions in 32S are discussed for higher
energy configurations by comparing the calculations of transition
strength B(CJ )with the experimental data. These configurations
are taken into account through a microscopic theory including
excitations from the core orbits and the model space orbits with nħω
excitations.
Excitations up to n=10 are considered. However n=6 seems to
be large enough for a sufficient convergence. The calculations
include the lowest seven 2+0 states of 32S.
Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreSurveillance cameras are video cameras used for the purpose of observing an area. They are often connected to a recording device or IP network, and may be watched by a security guard or law enforcement officer. In case of location have less percentage of movement (like home courtyard during night); then we need to check whole recorded video to show where and when that motion occur which are wasting in time. So this paper aims at processing the real time video captured by a Webcam to detect motion in the Scene using MATLAB 2012a, with keeping in mind that camera still recorded which means real time detection. The results show accuracy and efficiency in detecting motion
In this paper, simulation study of the frequency shift of photonic bandgaps due to refractive index scaling using liquids filled hollow-core photonic crystal fibers is presented. Different liquids (distilled water, n-hexane, methanol, ethanol and acetone) are used to fill the cladding of 2 types of hollow core photonic crystal fibers (HC19-1060, HC7-1060). These liquids are used to change the effective index scaling and index contrast of the cladding. The effect of increasing temperature of the liquid (20-100 0C for water and 20-70 0C for other liquids ) infiltrated hollow core fiber on the bandgap width and transmission properties has been computed. The maximum photonic bandgap width at 0.0243 has appeared with filling HC7-1060 PCF with
... Show MoreA new blind restoration algorithm is presented and shows high quality restoration. This
is done by enforcing Wiener filtering approach in the Fourier domains of the image and the
psf environments
The paper proposes a methodology for predicting packet flow at the data plane in smart SDN based on the intelligent controller of spike neural networks(SNN). This methodology is applied to predict the subsequent step of the packet flow, consequently reducing the overcrowding that might happen. The centralized controller acts as a reactive controller for managing the clustering head process in the Software Defined Network data layer in the proposed model. The simulation results show the capability of Spike Neural Network controller in SDN control layer to improve the (QoS) in the whole network in terms of minimizing the packet loss ratio and increased the buffer utilization ratio.
Praise be to God, Lord of the worlds, and prayers and peace be upon our Prophet Muhammad and his family and companions. And after:
For one of the greatest blessings of God Almighty upon us is the blessing of Islam, which brought people from darkness to light and from injustice and fear to security, justice, stability, and the preservation of blood, symptoms, rights, and sacrifices, because pride, strength, and dignity are what God chose and pleases His servants - namely - adherence to the Islamic religion, and in light of This must be said that the private legal defense (pushing the person) with its Islamic provisions and legislations is one of the great aspects that guarantees the establishment of a safe