The aim of this research to examine the impact of different level of Insulin certain biomarkers of local roosters semen after being cooling for varying lengths of periods, roosters semen pooled, diluted with extender, and distributed randomly among five groups: Diluted semen put through the semen cryopreservation technique; the control treatment (C1) 0 insulin; (C2) contained 4 IU/insulin; (C3) contained 5 IU/insulin; (C4) contained 6 IU/insulin; and (C5) contained 7 IU/insulin. After 0, 24, 48 and 72 hours, cooling semen were evaluated for plasma membrane integrity(MI), acrosome integrity(AI), malondialdehyde (MDA) and total antioxidant capacity (TCA). The result showed significant d
IMPLICATION OF GEOMECHANICAL EVALUATION ON TIGHT RESERVOIR DEVELOPMENT / SADI RESERVOIR HALFAYA OIL FIELD
In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the road in all the sections of the country. Vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the developing system is consist of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny Edge detection algo
... Show MoreOver the course of six decades, Iraq exposed to many events that have affected the Iraqi people from the social, physical and mental aspects. In this study, two groups of people (2369), from Iraq (G1) and the Michigan, United States (U.S) of America (G2) selected to compare the prevalence rate and effects of trauma factors such as mental illness (anxiety, depression and PTS), somatic diseases (heart disease, hypertension, and diabetes), substances abuse (illicit drugs, alcohol and tobacco), and chemicals pollution), and self-rated health among the two groups. The study results reveals a significant different between the two groups in the all indicators for trauma. The study conclude that Iraqi in U.S. (G2) suffer from factors completely dif
... Show MoreIn the image processing’s field and computer vision it’s important to represent the image by its information. Image information comes from the image’s features that extracted from it using feature detection/extraction techniques and features description. Features in computer vision define informative data. For human eye its perfect to extract information from raw image, but computer cannot recognize image information. This is why various feature extraction techniques have been presented and progressed rapidly. This paper presents a general overview of the feature extraction categories for image.
Image compression plays an important role in reducing the size and storage of data while increasing the speed of its transmission through the Internet significantly. Image compression is an important research topic for several decades and recently, with the great successes achieved by deep learning in many areas of image processing, especially image compression, and its use is increasing Gradually in the field of image compression. The deep learning neural network has also achieved great success in the field of processing and compressing various images of different sizes. In this paper, we present a structure for image compression based on the use of a Convolutional AutoEncoder (CAE) for deep learning, inspired by the diversity of human eye
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreA new modified differential evolution algorithm DE-BEA, is proposed to improve the reliability of the standard DE/current-to-rand/1/bin by implementing a new mutation scheme inspired by the bacterial evolutionary algorithm (BEA). The crossover and the selection schemes of the DE method are also modified to fit the new DE-BEA mechanism. The new scheme diversifies the population by applying to all the individuals a segment based scheme that generates multiple copies (clones) from each individual one-by-one and applies the BEA segment-wise mechanism. These new steps are embedded in the DE/current-to-rand/bin scheme. The performance of the new algorithm has been compared with several DE variants over eighteen benchmark functions including sever
... Show More