Sorting and grading agricultural crops using manual sorting is a cumbersome and arduous process, in addition to the high costs and increased labor, as well as the low quality of sorting and grading compared to automatic sorting. the importance of deep learning, which includes the artificial neural network in prediction, also shows the importance of automated sorting in terms of efficiency, quality, and accuracy of sorting and grading. artificial neural network in predicting values and choosing what is good and suitable for agricultural crops, especially local lemons.
Machine learning has a significant advantage for many difficulties in the oil and gas industry, especially when it comes to resolving complex challenges in reservoir characterization. Permeability is one of the most difficult petrophysical parameters to predict using conventional logging techniques. Clarifications of the work flow methodology are presented alongside comprehensive models in this study. The purpose of this study is to provide a more robust technique for predicting permeability; previous studies on the Bazirgan field have attempted to do so, but their estimates have been vague, and the methods they give are obsolete and do not make any concessions to the real or rigid in order to solve the permeability computation. To
... Show MoreHomosexuality is one of the important topics that have emerged in recent times in the Islamic and Arab world, as the topic was in the past one of the taboos and majorities and one of the topics that arouse disgust and is talked about secretly and practiced secretly as well.But today, with international and organizational support for this anomaly and its misrepresentation under the name of gender once again and gender again. It began to spread in all countries of the world, including Islamic and Arab countries, and with the presence of associations and influential people in the legislative and judicial authorities of countries that protect and defend homosexuals. Writing on this subject has become a necessity and a duty; to warn against the
... Show MoreIn current study a computation fluid dynamic (CFD) technique was used to investigate the effect of groynes shape and spacing on the scour pattern and the maximum scour depth in open channel flow. CFD model have been validated throughout comparing the numerical results with three previous experimental studies for a single groyne located in open channel with three different shapes (L, quadrant, and parabola shapes). The comparison revealed very good agreement between numerical results of the maximum scour depth with the results of all experimental models. Moreover, investigations of the effect of multi-groynes (three groynes and four groynes) arranged in parallel with constant spacing and also with variable spacing have been done, the
... Show MoreThe definition of the role of any institution in society is achieved through its objectives, The same is true for the military and how to deal with security threats in the humanitarian field ,Terrorism, which has almost replaced the traditional pattern of war, has waged a street war and intimidated individuals, families and society ,On the other hand, he found someone to meet him from a popular crowd of volunteers to defend their homeland from different sects, sects and religions, Thus, our study will be exposed to the role of popular mobilization in human security from a sociological point of view in Samarra, a field study of 100 male and female respondents.
It is no secret to everyone that the Arab individual suffers from poor self-awareness and political awareness, which made the state and the importance of its existence and preserving its institutions not among his interests, which made researchers wonder about the possibility of strengthening it and the extent of its impact on the future of building the contemporary Arab state, so the study attempted Addressing the issue of community awareness and its impact on building the state through a clear intellectual vision that blended what is social and political to define the concept of community awareness and highlight its importance and role as a basic pillar in shaping and building modern Arab countries. In the Arab world and ways to enhanc
... Show MoreBreast cancer is a heterogeneous disease characterized by molecular complexity. This research utilized three genetic expression profiles—gene expression, deoxyribonucleic acid (DNA) methylation, and micro ribonucleic acid (miRNA) expression—to deepen the understanding of breast cancer biology and contribute to the development of a reliable survival rate prediction model. During the preprocessing phase, principal component analysis (PCA) was applied to reduce the dimensionality of each dataset before computing consensus features across the three omics datasets. By integrating these datasets with the consensus features, the model's ability to uncover deep connections within the data was significantly improved. The proposed multimodal deep
... Show MoreMany authors investigated the problem of the early visibility of the new crescent moon after the conjunction and proposed many criteria addressing this issue in the literature. This article presented a proposed criterion for early crescent moon sighting based on a deep-learned pattern recognizer artificial neural network (ANN) performance. Moon sight datasets were collected from various sources and used to learn the ANN. The new criterion relied on the crescent width and the arc of vision from the edge of the crescent bright limb. The result of that criterion was a control value indicating the moon's visibility condition, which separated the datasets into four regions: invisible, telescope only, probably visible, and certai
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper