Preferred Language
Articles
/
1BeYZZIBVTCNdQwCZ64Y
Monitoring the Expansion of Unplanned Urbanization and its Impact on Climate Change based on Google Earth Engine Service, a Case Study of Baghdad / Iraq
...Show More Authors

     The earth's surface comprises different kinds of land cover, water resources, and soil, which create environmental factors for varied animals, plants, and humans. Knowing the significant effects of land cover is crucial for long-term development, climate change modeling, and preserving ecosystems. In this research, the Google Earth Engine platform and freely available Landsat imagery were used to investigate the impact of the expansion and degradation in urbanized areas, watersheds, and vegetative cover on the land surface temperature in Baghdad from 2004 to 2021. Land cover indices such as the Normalized Difference Vegetation Index, Normalized Difference Water Index, and Normalized Difference Built-up Index (NDVI, NDWI, and NDBI) were determined to examine the effects of land cover changes. In addition, the land surface temperature was calculated to assess urbanization expansion's impact on Baghdad's climate warming. The results showed a drastic decrease in vegetative cover and green land, on the other hand, a significant expansion in urbanized areas. Hence, from 2004 to 2021, the urbanized areas and open land rose by 37% and 3%, respectively, while the vegetative cover decreased by 41%. The maximum land surface temperature has risen 4° C, and the minimum land surface temperature has risen 2.5°C.

Scopus Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (9)
Scopus Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Impact of Computer on Human Health
...Show More Authors

As computers become part of our everyday life, more and more people are experiencing a
variety of ocular symptoms related to computer use. These include eyestrain, tired eyes, irritation,
redness, blurred vision, and double vision, collectively referred to as computer vision syndrome.
The effect of CVS to the body such as back and shoulder pain, wrist problem and neck pain.
Many risk factors are identified in this paper.
Primary prevention strategies have largely been confined to addressing environmental
exposure to ergonomic risk factors, since to date, no clear cause for this work-related neck pain
has been acknowledged. Today, millions of children use computers on a daily basis. Extensive
viewing of the compute

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Creative accounting practices for supply contracts and the role of internal audit in reducing them: An exploratory study on a sample of industrial companies in Iraq
...Show More Authors

Abstract:

                The internal control is the tool through which it is possible to verify and ensure the implementation of tasks in accordance with the established plans and programs and to evaluate the level of performance that is implemented within the different companies.

A guarantee from the supplier with the absence of a specialized technical committee that follows up the stages of implementing the contract and disbursing all amounts of financial dues to the supplier before completing the implementation of the contract and overlooking the non-implementation of some clauses of the contract by the committee in charge of

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 01 2024
Journal Name
Journal Of Engineering
Performance Evaluation of Two Stages Parallel Flow Indirect Evaporative Cooling with Aspen Pads in Baghdad Climate Conditions
...Show More Authors

This study delves into the realm of advanced cooling techniques by examining the performance of a two-stage parallel flow indirect evaporative cooling system enhanced with aspen pads in the challenging climate of Baghdad. The objective was to achieve average air dry bulb temperatures (43 oC) below the ambient wet bulb temperatures (24.95 oC) with an average relative humidity of 23%, aiming for unparalleled cooling efficiency. The research experiment was carried out in the urban environment of Baghdad, characterized by high temperature conditions. The investigation focused on the potential of the two-stage parallel flow setup, combined with the cooling capability of aspen pads, to surpass the limitat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 02 2022
Journal Name
Journal Of Legal Sciences
Judicial Precedent and Its Controls – A Comparative Study
...Show More Authors

Judicial jurisprudence is one of the important legal solutions to address the shortcomings of legislation. Throughout its long history, human societies have known many cases in which the judge finds himself facing a legislative vacuum in addition to civil legal texts that are difficult for the judge to implement due to ambiguity or contradiction, which requires diligence. To rule on resolving disputes before him in order not to deny justice, but the judge in his jurisprudence was not absolute, but rather bound by certain controls represented by observing the wisdom of legislation on the one hand and taking into account the nature of the texts on the other side, and from here this research came to shed light on the jurisprudence and its cont

... Show More
View Publication
Publication Date
Fri Jun 20 1930
Journal Name
College Of Islamic Sciences
Prison and imprisonment   And their impact on the strengthening of power In the Qur'anic perspective
...Show More Authors

Prison and imprisonment  
And their impact on the strengthening of power
In the Qur'anic perspective

View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Intelligent Systems
An efficient node selection algorithm in the context of IoT-based vehicular ad hoc network for emergency service
...Show More Authors
Abstract<p>With the recent growth of global populations, main roads in cities have witnessed an evident increase in the number of vehicles. This has led to unprecedented challenges for authorities in managing the traffic of ambulance vehicles to provide medical services in emergency cases. Despite the high technologies associated with medical tracks and advanced traffic management systems, there is still a current delay in ambulances’ attendance in times of emergency to provide patients with vital aid. Therefore, it is indispensable to introduce a new emergency service system that enables the ambulance to reach the patient in the least congested and shortest paths. However, designing an effici</p> ... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref