This study was conducted in College of Science \ Computer Science Department \ University of Baghdad to compare between automatic sorting and manual sorting, which is more efficient and accurate, as well as the use of artificial intelligence in automated sorting, which included artificial neural network, image processing, study of external characteristics, defects and impurities and physical characteristics; grading and sorting speed, and fruits weigh. the results shown value of impurities and defects. the highest value of the regression is 0.40 and the error-approximation algorithm has recorded the value 06-1 and weight fruits fruit recorded the highest value and was 138.20 g, Grading and sorting speed recorded the highest value and was 1.38 minutes.
With the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the
... Show MoreBiometrics represent the most practical method for swiftly and reliably verifying and identifying individuals based on their unique biological traits. This study addresses the increasing demand for dependable biometric identification systems by introducing an efficient approach to automatically recognize ear patterns using Convolutional Neural Networks (CNNs). Despite the widespread adoption of facial recognition technologies, the distinct features and consistency inherent in ear patterns provide a compelling alternative for biometric applications. Employing CNNs in our research automates the identification process, enhancing accuracy and adaptability across various ear shapes and orientations. The ear, being visible and easily captured in
... Show MoreThis study aimed at investigating the effect of using computer in
Efficiency of Training Programme of Science Teachers in Ajloun District in
Jordan.
1- What is the effect of using computer in program for the two groups
2- ( the experimental and control group ) .
3- Are there any statistics different in the effect of using computer
program for the two groups ?
4- Are there any statistics (comparison ) or different of the effect of the
effect of using computer program refer to the sex (male or female )?
The community of the study consisted of all the science student in
educational directorate of Ajloun district for the academic year 2009 –
2010, they are (120) ( male and female) . The sample of the study<
Many Iraqi provinces had collective cemeteries, especially in the middle and southern regions of Iraq, but many of those cemetery locations are undefined yet. Ground penetration radar has two features that make it optimal from a geophysical perspective for shallowly detecting sensitive materials near the surface. First, the instantaneous image is formed upon scanning, called a radargram. Second, the non-destructive inference of the scanned materials. For these two reasons, this technique was chosen to conduct a simulation process to reveal the old human remains in Iraq's central and southern areas using another model with the same physical feature (old burial) at the AL-Khamisiya site, Thi-Qar province.
The demanded stage
... Show MoreThe necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show MoreThe research problem arose from the researchers’ sense of the importance of Digital Intelligence (DI), as it is a basic requirement to help students engage in the digital world and be disciplined in using technology and digital techniques, as students’ ideas are sufficiently susceptible to influence at this stage in light of modern technology. The research aims to determine the level of DI among university students using Artificial Intelligence (AI) techniques. To verify this, the researchers built a measure of DI. The measure in its final form consisted of (24) items distributed among (8) main skills, and the validity and reliability of the tool were confirmed. It was applied to a sample of 139 male and female students who were chosen
... Show MoreThis study aims to build a wireless computer network for a large company or university to enhance mobility and allow university users to stay connected at any time or place, which is achieved by applying the Universal Interoperability for Microwave Access (WiMax) technology. WiMax is based on the 802.16 sets of standards and has the most efficient and advanced hardware capabilities to meet the demands of teachers and students to browse the web or download files quickly. OPNET Modeler version 14.5 was used to determine the quality of service parameters of WiMax.
This study examined the effect of essential oils extracted from peel of Citrus paradisi and Citrus sinensis on two species of fungi: Penicillium oxalicum and Fusarium oxysporum as well as effect of two fungicides: Carbendazim and Thiophanatemethyl against above fungi. Results showed that the essential oil of Citrus paradisi inhibited the radial growth of Penicillium oxalicum and Fusarium oxysporum at concentration 4%. Nevertheless, the essential oil of Citrus sinensis inhibited the radial growth at concentration 5 and 4%, respectively. Furthermore, the two studied fungicides inhibited radial growth of these fungi too. Therefore, there are a positive relationship between the evaluating of concentration and the percentage of inhibiting of rad
... Show MoreNetwork security is defined as a set of policies and actions taken by a network administrator in order to prevent unauthorized access, penetrated the defenses and infiltrated the network from unnecessary intervention. The network security also involves granting access to data using a pre-defined policy. A network firewall, on the other hand, is a network appliance that controls incoming and outgoing traffic by examining the traffic flowing through the network. This security measure establishes a secure wall [firewall] between a trusted internal network and the outside world were a security threat in shape of a hacker or a virus might have existed