Preferred Language
Articles
/
3hhLeZQBVTCNdQwCBhmM
EVALUATING THE CHANGE DETECTION OF(NDVI) FOR BABYLON CITY USING REMOTE SENSING AND GIS TECHNIQUES (2015-2020)
...Show More Authors

The normalized difference vegetation index (NDVI) is an effective graphical indicator that can be used to analyze remote sensing measurements using a space platform, in order to investigate the trend of the live green vegetation in the observed target. In this research, the change detection of vegetation in Babylon city was done by tracing the NDVI factor for temporal Landsat satellite images. These images were used and utilized in two different terms: in March 19th in 2015 and March 5th in 2020. The Arc-GIS program ver. 10.7 was adopted to analyze the collected data. The final results indicate a spatial variation in the (NDVI), where it increases from (1666.91 𝑘𝑚2) in 2015 to (1697.01 𝑘𝑚2)) in 2020 between the two observed periods. About 25 X106 m2 as a new area that is covered with vegetation between the two observed terms (2015) and 2020). The increased trends can be explained by the evolution of agricultural styles that used by farmers.

Crossref
View Publication
Publication Date
Wed Dec 30 2020
Journal Name
Journal Of Planner And Development
The Infrastructure and the Potential of the Tourism Industry in the Holy City of Najaf.
...Show More Authors

The infrastructure is one of the basic components of the tourism industry in Iraq in general and in Najaf in particular, in spite of there are obstacles and problems that which are hindered the development of tourism in Iraq, some of them are related to the  tourism industry itself, some are related to the security and political situation, and some are related to poor management of tourism. However, the infrastructure is considered the cornerstone of the success of the tourism industry in Iraq and other countries, if it is available, it can be a potential indicator of success, and on the contrary, it is a hindrance to go forward. The aim of this research is to shed light on the availability of requirements for the s

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
2012 International Conference On Radar, Communication And Computing (icrcc)
BER performance improvement for secure wireless communication systems based on CSK- STBC techniques
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input Multiple-Output (MIMO) channels by combining chaos modulation with a suitable Space Time Block Code (STBC). It is well known that the use of Chaotic Modulation techniques can enhance communication security. However, the performance of systems using Chaos modulation has been observed to be inferior in BER performance as compared to conventional communication

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Mon Jan 28 2013
Journal Name
Spie Proceedings
BER performance enhancement for secure wireless communication systems based on chaotic-MIMO techniques
...Show More Authors

The growing interest in the use of chaotic techniques for enabling secure communication in recent years has been motivated by the emergence of a number of wireless services which require the service provider to provide low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. While the use of Chaotic maps can enhance security, it is seen that the overall BER performance gets degraded when compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code. The performance of Chaos Shift Keying (CSK) wi

... Show More
View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 15 2020
Journal Name
Al-academy
Treatments with Graphic Techniques for the Scene in Theatrical Show (Applied study): عماد هادي عباس -محمود جباري حافظ
...Show More Authors

The current research studies the digital techniques in order to identify the treatments with graphic techniques for the theatrical scene, which includes a number of programs and treatment tools with digital technique to identify the visual and aesthetic dimensions and outputs achieved in the design of the theatrical scene in addition to the options, that they provide in the design of a system of hypotheses for the theatrical world, In order to be an experimental mediator in achieving the creative hypothesis, which limited the research with a pivotal objective which is: identifying the digital techniques employed in the graphic digital design for the scene in the theatrical show. The research lies in its objective limits stated in the met

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Al–bahith Al–a'alami
Using Social Media sites by the Iraqi women and the Achieved The Use of Iraqi Women of Social Networking Sites and the Satisfactions Generated from Them.: A Survey Study of the City of Baghdad
...Show More Authors

The problem of this research lies in the fact that there is a lack of accurate scientific perceptions about the size of the use of Iraqi women’s social networking sites and the motives behind this use and the expectations generated by them.
The goals of the research are as follows:
1- Determine the extent of Iraqi women’s use of social networking sites (Facebook, YouTube, twitter, and Instagram).
2- Investigative the motives behind the use of social networking sites by Iraqi women.
3- Detecting the repercussions of Iraqi women’s use of social networking sites (Facebook, you tube, twitter, and Instagram).
The research is classified as a descriptive one. The researchers use the survey methodology. The research commu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Swarm And Evolutionary Computation
A review of heuristics and metaheuristics for community detection in complex networks: Current usage, emerging development and future directions
...Show More Authors

View Publication
Scopus (67)
Crossref (48)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Swarm And Evolutionary Computation
A review of heuristics and metaheuristics for community detection in complex networks: Current usage, emerging development and future directions
...Show More Authors

Scopus (67)
Crossref (48)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Swarm And Evolutionary Computation
A review of heuristics and metaheuristics for community detection in complex networks: Current usage, emerging development and future directions
...Show More Authors

Sensibly highlighting the hidden structures of many real-world networks has attracted growing interest and triggered a vast array of techniques on what is called nowadays community detection (CD) problem. Non-deterministic metaheuristics are proved to competitively transcending the limits of the counterpart deterministic heuristics in solving community detection problem. Despite the increasing interest, most of the existing metaheuristic based community detection (MCD) algorithms reflect one traditional language. Generally, they tend to explicitly project some features of real communities into different definitions of single or multi-objective optimization functions. The design of other operators, however, remains canonical lacking any inte

... Show More
Scopus (67)
Crossref (48)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Webology
The role of change management in achieving competetive advantage a case study in diyala state company
...Show More Authors

The research aims to test the correlation relationships between wise leadership, and the business model, and to demonstrate its influence (wise leadership) on the business model. Therefore, two main hypotheses were put forward. The research was applied to a sample consisting of (87) managers and deputy managers, some of them are members on the board of directors of the researched company. The questionnaire was adopted as a basic tool for collecting data, in addition to personal interviews. A number of statistical methods were used to analyze the data and obtain results. The researcher showed a set of results, including: There is a significant correlation between wise leadership and business model. There is an influence of wise leadership on

... Show More