The normalized difference vegetation index (NDVI) is an effective graphical indicator that can be used to analyze remote sensing measurements using a space platform, in order to investigate the trend of the live green vegetation in the observed target. In this research, the change detection of vegetation in Babylon city was done by tracing the NDVI factor for temporal Landsat satellite images. These images were used and utilized in two different terms: in March 19th in 2015 and March 5th in 2020. The Arc-GIS program ver. 10.7 was adopted to analyze the collected data. The final results indicate a spatial variation in the (NDVI), where it increases from (1666.91 𝑘𝑚2) in 2015 to (1697.01 𝑘𝑚2)) in 2020 between the two observed periods. About 25 X106 m2 as a new area that is covered with vegetation between the two observed terms (2015) and 2020). The increased trends can be explained by the evolution of agricultural styles that used by farmers.
ABSTRACT
The simulation of groundwater movement has been carried out by using MODFLOW model
in order to show the impact of change of water surface elevation of the Tigris river on layers of
the aquifer system for Nuclear Research Center at Al-Tuwaitha area, in addition to evaluate the
ability of the proposed pumping well to collect groundwater and change the direction of flow at
steady-state. The results of the study indicated that there is a good match between the values of
groundwater levels that calculated in the model and measured in the field, where mean error is
0.09 m.
The study also showed that the increasing of water surface elevation of the
The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreObjectives: The study aims to (1) Assess the parents' efficacy for child healthy weight behavior. (2) Identify the difference in parents’ efficacy for child healthy weight behavior between the groups of parent’s gender, family’s socioeconomic status, child’s gender, and child’s birth order, (3) Find out the relationship between parents’ age, child’s age, child’s body mass index, family’s socioeconomic status, the number of children in the family and parents’ efficacy for child healthy weight behavior.
Methodology: A descriptive correlational study is conducted for the period from November 11th, 2018 to March 25th, 2019 to assess the parents' efficacy for child healthy weight behavior. The study was carried-out in (
In this study, concentrations of radon were measured for seventeen samples of soil distributed in three Sulphuric Spring, in addition to other regions as a background in Hit City in AL-Anbar Governorate. The radon concentrations in soil samples measured by using alpha-emitters registration that emits from radon (222Rn) in (CR-39) track detector. The concentrations values were calculated by a comparison with standard samples. The results show that the radon concentrations in first spring varies from (258.253- 347.762 Bq/m3), second spring (230.374-305.209 Bq/m3), third spring (292.002-336.023 Bq/m3) and the average radon concentration in other regions (187.821 Bq/m3). As a conclusion of the study radon concentration in Sulphuric Spring is r
... Show MoreThe aim of the research to highlight the calendar of the most important tools used by the Central Bank of Iraq, in the implementation of the function of supervisory oversight, to verify the stability of the banking system, and protect the funds of shareholders, and depositors in general and the absence of any raises the risks of default and financial failure in particular, for commercial banks. The most important flaws and weaknesses in these tools, in the early detection of the risks of continuity in a timely manner, The study concluded a set of conclusions, including the weakness of the tools used in the performance of the function of supervisory oversight in detecting cases of default and financial failure in the early time as well as
... Show MoreAverage per capita GDP income is an important economic indicator. Economists use this term to determine the amount of progress or decline in the country's economy. It is also used to determine the order of countries and compare them with each other. Average per capita GDP income was first studied using the Time Series (Box Jenkins method), and the second is linear and non-linear regression; these methods are the most important and most commonly used statistical methods for forecasting because they are flexible and accurate in practice. The comparison is made to determine the best method between the two methods mentioned above using specific statistical criteria. The research found that the best approach is to build a model for predi
... Show MoreI
In this study, optical fibers were designed and implemented as a chemical sensor based on surface plasmon resonance (SPR) to estimate the age of the oil used in electrical transformers. The study depends on the refractive indices of the oil. The sensor was created by embedding the center portion of the optical fiber in a resin block, followed by polishing, and tapering to create the optical fiber sensor. The tapering time was 50 min. The multi-mode optical fiber was coated with 60 nm thickness gold metal. The deposition length was 4 cm. The sensor's resonance wavelength was 415 nm. The primary sensor parameters were calculated, including sensitivity (6.25), signal-to-noise ratio (2.38), figure of merit (4.88), and accuracy (3.2)
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show More