As Albizia lebbeck is one of the important species in Iraq and the region, its wood has subjected to investigation through the assessment of differences in its element dimensions and specific gravity under Baghdad conditions. Variations of fiber length, fiber width, cell wall thickness, vessel diameter, and density of wood were examined along the stem and horizontally. Results showed that fiber lengths were within the normal range, but their widths were narrower than common range of hardwoods. There were little increase in fiber length, width, wall thickness as the height position increased. Vessel diameter has been affected contrarily. No significant effects of height on specific gravity could be
... Show MoreObjectives: A cross sectional analytic study was carried out to identify the maternal risk factors which
contribute to occurrence of low birth weight, and to determine the statistical significant differences between low
birth weight and maternal risk factors.
Methodology: A purposive sample of (400) woman was selected from AL-Elwyia Maternity Teaching Hospital
and Fatima Al-Zaharia Maternity and Pediatric Teaching Hospital. Data was collected through the interview of
mothers. Questionnaire format was designed and consisted seven parts, demographic variables, and reproductive
variables , Reproductive health variables, complications during the current pregnancy, the mother newborn
variables nutritional status for the m
Background: Several risk managem-ent standards had been developed including the Project Management Institute, the National Institute of Standards and Technology, actuarial societies, and ISO standards.
Objective: The study aimed at evaluating risk management among managers of model and ordinary primary health care centers in Baghdad City and comparing the risk management among these centers.
Methods: A descriptive comparative des
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreIn this paper, new brain tumour detection method is discovered whereby the normal slices are disassembled from the abnormal ones. Three main phases are deployed including the extraction of the cerebral tissue, the detection of abnormal block and the mechanism of fine-tuning and finally the detection of abnormal slice according to the detected abnormal blocks. Through experimental tests, progress made by the suggested means is assessed and verified. As a result, in terms of qualitative assessment, it is found that the performance of proposed method is satisfactory and may contribute to the development of reliable MRI brain tumour diagnosis and treatments.
In the present paper, Arabic Character Recognition Edge detection method based on contour and connected components is proposed. First stage contour extraction feature is introduced to tackle the Arabic characters edge detection problem, where the aim is to extract the edge information presented in the Arabic characters, since it is crucial to understand the character content. The second stage connected components appling for the same characters to find edge detection. The proposed approach exploits a number of connected components, which move on the character by character intensity values, to establish matrix, which represents the edge information at each pixel location .
... Show MoreTested effective Alttafaria some materials used for different purposes, system a bacterial mutagenesis component of three bacterial isolates belonging to different races and materials tested included drug Briaktin