The earth's surface comprises different kinds of land cover, water resources, and soil, which create environmental factors for varied animals, plants, and humans. Knowing the significant effects of land cover is crucial for long-term development, climate change modeling, and preserving ecosystems. In this research, the Google Earth Engine platform and freely available Landsat imagery were used to investigate the impact of the expansion and degradation in urbanized areas, watersheds, and vegetative cover on the land surface temperature in Baghdad from 2004 to 2021. Land cover indices such as the Normalized Difference Vegetation Index, Normalized Difference Water Index, and Normalized Difference Built-up Index (NDVI, NDWI, and NDBI) were determined to examine the effects of land cover changes. In addition, the land surface temperature was calculated to assess urbanization expansion's impact on Baghdad's climate warming. The results showed a drastic decrease in vegetative cover and green land, on the other hand, a significant expansion in urbanized areas. Hence, from 2004 to 2021, the urbanized areas and open land rose by 37% and 3%, respectively, while the vegetative cover decreased by 41%. The maximum land surface temperature has risen 4° C, and the minimum land surface temperature has risen 2.5°C.
Parties as active units in this process in order to work must have access to sources of funding in order to maintain their political presence in society and participate in the process of electoral competition, To win the election, bolstering the huge role that money has played in influencing the principle of equality among contestants in the elections. Those who own money will have a greater chance of winning the elections while less competitive opportunities for others who do not own the money or what they own does not give them the competitive ability to win elections. From this point of view, controlling political finance through legal regulation and institutional, media and popular monitoring has become an important requirement
... Show MoreThe high mobility group A1 gene (HMGA1) rs139876191 variant has been related to metabolic syndrome and type 2 diabetes, but data are lacking in Middle Eastern populations. The study aimed to assess whether the HMGA1 rs139876191 variant is associated with metabolic syndrome risk and whether this variant predicts the risk of insulin resistance. This case-control study was carried out at single center in Kirkuk city/ Iraq from February to August 2022. Polymorphisms in HMGA1 and genotyping were identified by Sanger sequencing of genomic DNA obtained from 91 Iraqi participants (61 patients with metabolic syndrome and 30 control). Lipid profile, serum (glucose and insulin), glycated hemoglobin, blood pressure, body mass index, and waist circumfer
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
A Multiple System Biometric System Based on ECG Data
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreBackground: Non-nutritive sucking habits are common in infants and toddlers. One of the most common non-nutritive sucking habits is pacifier; its prevalence varies from one population to another. This study was conducted to determine the prevalence of pacifier sucking habit among children aged 1-5 years old in Baghdad city and to assess its effect on the occlusion of primary dentition concerning posterior crossbite. Materials and methods: The study was carried out among 1222 children aged 1-5 years old, from which 50 children with continues pacifier sucking habit were chosen to be the study group, compared to 50 children without any sucking habit (control group) matching the study group in age and gender. Children were examined clinically t
... Show MoreBN Rashid