Image Fusion Using A Convolutional Neural Network
Air pollution from various sources is one of the most serious environmental problems, especially after pollutants are deposited on the surface of the soil and leaves of the plants and then transferred to the rest of the plant and entering food chains. The present study was conducted to determine the effects of air pollution on different biochemical parameters in Eucalyptus sp. and calculation the Air Pollution Tolerance Index. The selected plant leaves were collected from five sites, four of them within the city of Baghdad, namely Al-Jadriya, Al-Andlous, Al-Doura and close to the private generators to represent the urban areas and Abu Ghraib site to represent the rural area. The leaves were taken on a seasonal basis for the period from Octo
... Show MoreThroughout this work we introduce the notion of Annihilator-closed submodules, and we give some basic properties of this concept. We also introduce a generalization for the Extending modules, namely Annihilator-extending modules. Some fundamental properties are presented as well as we discuss the relation between this concept and some other related concepts.
Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different
... Show MoreData security is a fundamental parameter on communication system development. The capability of protecting and securing the information is a great essence for the growth of the data security and electronic commerce. The cryptography has a significant influence upon information security systems against the variety of the attacks, in which higher complexity in secret keys results in the increase of security and the cryptography algorithms’ complexity. The sufficient and newer cryptographic methods’ versions may helpful in the reduction of the security attacks. The main aim of this research is satisfying the purpose of the information security through the addition of a new security level to the Advanced Encryption Standard (AES) algorithm
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreEndometrial Cancer (EC) is one of the most common malignancy of the female reproductive system. With an increasing incidence, it is important to improve the new prognosis ways for its pre-diagnosis that must be early, accurate and effective. This study aimed to search for biological (like some new interleukins) which could help in early diagnosis of EC before the hysterectomy. Currently not enough research is being done exploiting linking between the interleukins submitted in this study and EC. Epically IL-36 and IL-38, which have been recently described and are still under study in the world. This study is the first of its kind in Iraq. Fifty-five patients with EC (mainly in their first or second stage, due to early diagnosis and who ne
... Show MoreOral carcinoma is the 6th most common cancer in the world. MicroRNAs are small non-coding single stranded RNAs. They have been shown to be capable of altering mRNA expression; thus some are oncogenic or tumor suppressive in nature. The salivary microRNA-31 has been proposed as a sensitive marker for oral malignancy since it was abundant in saliva more than in plasma. A total of 55 whole saliva samples were collected from 35 cases diagnosed with OC their ages and gender matched with 20 healthy subjects. TaqManq RT-PCR was performed for RNA samples. Mean age was 52.23+13.73 years in cases (range:17-70 years) with male predominance represented 69%. Risk of smoking and alcoholism was highly significant. The median fold change of miR-31 was sign
... Show MoreResults showed high efficiency of the predator Chrysoperla carnea (Stephens) to attack and consume nymphal instars and adults of cabbage aphid, Brevicoryne brassicae (L.).The total average of the nymphal instars consumed by the larval stage of predator were 308.67, 285.9, 198.77, 154.7 for 1st ,2nd ,3rd ,4th nymphal instars respectively .While it was 110,107.9 for apterae and alatae respectively . Also, predation efficiency increases with the progress of the larval instars up to the third (last) which was the most voracious .The 1st instar nymph consumed by the larvae of the predator were 47,80,181.67 nymphs ,with predation rate of 14.71% , 23.75% and 50.13% for 1st ,2nd and 3rd larval instars
Start your abstract here the objective of this paper is to study the dynamical behaviour of an eco-epidemiological system. A prey-predator model involving infectious disease with refuge for prey population only, the (SI_) infectious disease is transmitted directly, within the prey species from external sources of the environment as well as, through direct contact between susceptible and infected individuals. Linear type of incidence rate is used to describe the transmission of infectious disease. While Holling type II of functional responses are adopted to describe the predation process of the susceptible and infected predator respectively. This model is represented mathematically by
خلٌقت مشتقات الجديدة من4-methyl-7-ethylcoumarin التي تحمل مجموعة azo من خلال سلسلة من التفاعلات المتسلسلة واختبار نشاطها البيولوجي. بدءًا من 7-اثيل-4-مثيل كومارين الذي حضٌر من تفاعل ميتا اثيل فينول مع اثيل اسيتو اسيتيت بواسطة تفاعل بكمان بعدها تم نيترة 7-اثيل-4-مثيل كومارين باستخدام حامض النيتريك بوجود H2SO4المركز لإنتاج ايزومر واحد 7-اثيل-4-مثيل -8-نايتروكومارين تحت التبريد في درجة حرار Co (2-5) ، ثم اختزال
... Show MoreBy use the notions pre-g-closedness and pre-g-openness we have generalized a class of separation axioms in topological spaces. In particular, we presented in this paper new types of regulαrities, which we named ρgregulαrity and Sρgregulαrity. Many results and properties of both types have been investigated and have illustrated by examples.
Dielectric barrier discharges (DBD) can be described as the presence of contact with the discharge of one or more insulating layers located between two cylindrical or flat electrodes connected to an AC/pulse dc power supply. In this work, the properties of the plasma generated by dielectric barrier discharge (DBD) system without and with a glass insulator were studied. The plasma was generated at a constant voltage of 4 kV and fixed distance between the electrodes of 5 mm, and with a variable flow rate of argon gas (0.5, 1, 1.5, 2 and 2.5) L/min. The emission spectra of the DBD plasmas at different flow rates of argon gas have been recorded. Boltzmann plot method was used to calculate the plasma electron temperature (Te), and Stark broadeni
... Show Moreتمت دراسة الزوج المجري Sip-39 باستخدام طرق القياس الضوئي والطيفي. البيانات الرصدية اخذت من اصدار البيانات السابع عشر (DR17) من "Sloan Digital Sky Survey (SDSS)" وتمت عمل ال fitting لصور المجرتين باستخدام برنامج (IRAF) من خلال المكتبةSTSDAS باستخدام ELLIPS task.تم دراسة وحساب كل من اللمعان السطحي للمجرتين في الزوج ، بالإضافة إلى الانبعاث الكلي ، وشكل القطع الناقص ، وزوايا انحراف المحور الكبير، الانحرافات العمودية والأفقية ، ومعاملا
... Show MoreNumerical simulations are carried out to assess the quality of the circular and square apodize apertures in observing extrasolar planets. The logarithmic scale of the normalized point spread function of these apertures showed sharp decline in the radial frequency components reaching to 10-36 and 10-34 respectively and demonstrating promising results. This decline is associated with an increase in the full width of the point spread function. A trade off must be done between this full width and the radial frequency components to overcome the problem of imaging extrasolar planets.
The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show MoreA Multiple System Biometric System Based on ECG Data
في هذه المقالة ، يتم فحص تأثير متغير الدوران والمتغيرات الأخرى على التدفق التمعجي لسائل Powell-Eyring في قناة غير متماثلة مائلة مع مجال مغناطيسي مائل عبر وسط مسامي مع نقل الحرارة. يُفترض الطول الموجي الطويل وعدد رينولدز المنخفض ، حيث يتم استخدام نهج الاضطراب لحل المعادلات الحاكمة غير الخطية في نظام الإحداثيات الديكارتية لإنتاج حلول متسلسلة. يتم التعبير عن توزيعات السرعة وتدرجات الضغط رياضيًا. من خلال جمع الأرقام
... Show More