Preferred Language
Articles
/
8BenNY8BVTCNdQwCO2GP
Modis Satellite Data Evaluation for Detecting the Dust Storm Using Remote Sensing Techniques Over Iraq
...Show More Authors
Abstract<p>The phenomena of Dust storm take place in barren and dry regions all over the world. It may cause by intense ground winds which excite the dust and sand from soft, arid land surfaces resulting it to rise up in the air. These phenomena may cause harmful influences upon health, climate, infrastructure, and transportation. GIS and remote sensing have played a key role in studying dust detection. This study was conducted in Iraq with the objective of validating dust detection. These techniques have been used to derive dust indices using Normalized Difference Dust Index (NDDI) and Middle East Dust Index (MEDI), which are based on images from MODIS and in-situ observation based on hourly wind speed and visibility during May 4-5 2022 and 25-26 June 2022. In this study, the appropriateness of two various MODIS-based techniques to discover dust in 13 stations in Iraq was examined. The results suggest NDDI index is the most appropriate index to identifying dust storms across Iraq. Also, the MEDI index has impairment to discover dust through multiple land-cover forms. Beside that MEDI consider an ineffective index to detect and discover dust storms throughout whole kinds of land cover over Iraq.</p>
Scopus Crossref
View Publication
Publication Date
Fri Mar 24 2017
Journal Name
Journal Of Engineering
Composite Techniques Based Color Image Compression
...Show More Authors

Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3 rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet transform (MMM) in M technique wh

... Show More
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Tue Feb 28 2017
Journal Name
Journal Of Engineering
Composite Techniques Based Color Image Compression
...Show More Authors

     Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3rd  level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
IMPLEMENTATION OF THE SKIP LIST DATA STRUCTURE WITH IT'S UPDATE OPERATIONS
...Show More Authors

A skip list data structure is really just a simulation of a binary search tree. Skip lists algorithm are simpler, faster and use less space. this data structure conceptually uses parallel sorted linked lists. Searching in a skip list is more difficult than searching in a regular sorted linked list. Because a skip list is a two dimensional data structure, it is implemented using a two dimensional network of nodes with four pointers. the implementation of the search, insert and delete operation taking a time of upto . The skip list could be modified to implement the order statistic operations of RANKand SEARCH BY RANK while maintaining the same expected time. Keywords:skip list , parallel linked list , randomized algorithm , rank.

View Publication Preview PDF
Publication Date
Mon Feb 18 2019
Journal Name
Iraqi Journal Of Physics
Data visualization and distinct features extraction of the comet Ison 2013
...Show More Authors

The distribution of the intensity of the comet Ison C/2013 is studied by taking its histogram. This distribution reveals four distinct regions that related to the background, tail, coma and nucleus. One dimensional temperature distribution fitting is achieved by using two mathematical equations that related to the coordinate of the center of the comet. The quiver plot of the gradient of the comet shows very clearly that arrows headed towards the maximum intensity of the comet.

View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Optik
Plasma parameters of Au nano-particles ablated on porous silicon produced via Nd-YAG laser at 355 nm for sensing NH3 gas
...Show More Authors

a laser ablation Q-switched Nd: YAG laser with a wave-length of 355 nm at a variety of laser pulse energies (E) and deposited on porous silicon (PS). Optical emission spectrometer was used to diagnosed medium air to study gold plasma characteristics and prepared Au nanoparticles. The laser pulse energy influence has been studied on the plasma characteristics in air. The data showed the emergence of the ionic (Au II) spectral emission lines in the gold plasma emission spectrum. XRD has been utilized to examine structural characteristics. Moreover, AFM results 37.2 nm as the mean value of the diameter that is coordinated in a shape similar to the rod that appears for Au NPs, in addition to that, TEM has been an indication of the fact that syn

... Show More
View Publication
Scopus (38)
Crossref (33)
Scopus Clarivate Crossref
Publication Date
Thu Nov 04 2021
Journal Name
Optik - International Journal For Light And Electron Optics
Plasma parameters of Au nano-particles ablated on porous silicon produced via Nd-YAG laser at 355 nm for sensing NH3 gas
...Show More Authors

The current study aimed the syntheses and characterizations of Gold nanoparticles (Au NPs) using a laser ablation Q-switched Nd: YAG laser with a wave-length of 355 nm at a variety of laser pulse energies (E) and deposited on porous silicon (PS). Optical emission spectrometer was used to diagnosed medium air to study gold plasma characteristics and prepared Au nanoparticles. The laser pulse energy influence has been studied on the plasma characteristics in air. The data showed the emergence of the ionic (Au II) spectral emission lines in the gold plasma emission spectrum. XRD has been utilized to examine structural characteristics. Moreover, AFM results 37.2 nm as the mean value of the diameter that is coordinated in a shape similar to the

... Show More
Publication Date
Tue Jan 03 2023
Journal Name
College Of Islamic Sciences
Ruling on selling big data (Authentical Fiqh Study): Ruling on selling big data (Authentical Fiqh Study)
...Show More Authors

Abstract:

Research Topic: Ruling on the sale of big data

Its objectives: a statement of what it is, importance, source and governance.

The methodology of the curriculum is inductive, comparative and critical

One of the most important results: it is not permissible to attack it and it is a valuable money, and it is permissible to sell big data as long as it does not contain data to users who are not satisfied with selling it

 Recommendation: Follow-up of studies dealing with the provisions of the issue

Subject Terms

Judgment, Sale, Data, Mega, Sayings, Jurists

 

View Publication Preview PDF
Publication Date
Mon Feb 25 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Using Classification of Brown risks in Evaluation of the internal control system: Application Research in Karbala University
...Show More Authors

Internal control system is a safety valve that preserves economic units assets and ensure the accuracy of financial data, as well as to obligation in the laws, regulations, administrative policies ,and improve the efficiency, effectiveness and economic of operation, so it has become imperative for these units attention to internal and developed control system The research problem in exposure the economic units when the exercise of their business to many of the risks to growth or hinder the achievement of its objectives and the risks (financial, operational, strategy, risk) and not it rely on risk Assessment according to modern scientific methods, as in Brown's risk Classification, Which led to the weakness of the internal control identif

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 30 2021
Journal Name
Al-kindy College Medical Journal
Diagnostic Evaluation of Uterine Artery Doppler Imaging for the Prediction of Early Abnormal Pregnancy
...Show More Authors

Objective: to assess the predictive value of Doppler imaging of the uterine artery in the identification of early intrauterine abnormal pregnancy as compared to a normal intrauterine pregnancy. Subjects and methods: one hundred and twenty pregnant ladies, at their 6-12 weeks of gestation, with a singleton pregnancy were included in this population-based case-control study. Thirty women with a missed miscarriage, 30 with hydatidiform mole, 30 with a blighted ovum, and 30 as a control group, without risk factors, underwent Doppler interrogation of the uterine arteries. Resistive index (RI), pulsatility index (PI), and the systolic/diastolic ratio (S/D) were measured for both sides. The t-test, or ANOVA test when appropriate, was

... Show More
Crossref