Image of landsate-7 taken by thematic mapper was used and classified using supervised method. Results of supervised classification indicated presence of nine land cover classes. Salt-soils class shows the highest reflectance value while water bodies' class shows the lowest values. Also the results indicated that soil properties show different effects on reflectance. There was a high significant positive relation of carbonate, gypsum, electric conductivity and silt content, while there was a week positive relation with sand and negative relation with organic matter, water content, bulk density and cataion exchange capacity.
Image of landsate-7 taken by thematic mapper was used and classified using supervised method. Results of supervised classification indicated presence of nine land cover classes. Salt-soils class shows the highest reflectance value while water bodies' class shows the lowest values. Also the results indicated that soil properties show different effects on reflectance. There was a high significant positive relation of carbonate, gypsum, electric conductivity and silt content, while there was a week positive relation with sand and negative relation with organic matter, water content, bulk density and cataion exchange capacity.
This article deals with the approximate algorithm for two dimensional multi-space fractional bioheat equations (M-SFBHE). The application of the collection method will be expanding for presenting a numerical technique for solving M-SFBHE based on “shifted Jacobi-Gauss-Labatto polynomials” (SJ-GL-Ps) in the matrix form. The Caputo formula has been utilized to approximate the fractional derivative and to demonstrate its usefulness and accuracy, the proposed methodology was applied in two examples. The numerical results revealed that the used approach is very effective and gives high accuracy and good convergence.
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreIn this research an Artificial Neural Network (ANN) technique was applied for the prediction of Ryznar Index (RI) of the flowing water from WTPs in Al-Karakh side (left side) in Baghdad city for year 2013. Three models (ANN1, ANN2 and ANN3) have been developed and tested using data from Baghdad Mayoralty (Amanat Baghdad) including drinking water quality for the period 2004 to 2013. The results indicate that it is quite possible to use an artificial neural networks in predicting the stability index (RI) with a good degree of accuracy. Where ANN 2 model could be used to predict RI for the effluents from Al-Karakh, Al-Qadisiya and Al-Karama WTPs as the highest correlation coefficient were obtained 92.4, 82.9 and 79.1% respectively. For
... Show MorePure cadmium oxide films (CdO) and doped with zinc were prepared at different atomic ratios using a pulsed laser deposition technique using an ND-YAG laser from the targets of the pressed powder capsules. X-ray diffraction measurements showed a cubic-shaped of CdO structure. Another phase appeared, especially in high percentages of zinc, corresponding to the hexagonal structure of zinc. The degree of crystallinity, as well as the crystal size, increased with the increase of the zinc ratio for the used targets. The atomic force microscopy measurements showed that increasing the dopant percentage leads to an increase in the size of the nanoparticles, the particle size distribution was irregular and wide, in addition, to increase the surfac
... Show MoreThe contemporary business environment is witnessing increasing calls for modifications to the traditional cost system, and a trend towards adopting cost management techniques to provide appropriate financial and non-financial information for senior and executive departments, including the Resource Consumption Accounting (RCA) technique in question, which classifies costs into fixed and variable to support the decision-making process. Moreover, (RCA) combines two approaches to cost estimation, the first based on activity-based cost accounting (ABC) and the second on the German cost accounting method (GPK). The research aims to provide a conceptual vision for resource consumption accounting, after Considering it as an accounting te
... Show MoreClassification of imbalanced data is an important issue. Many algorithms have been developed for classification, such as Back Propagation (BP) neural networks, decision tree, Bayesian networks etc., and have been used repeatedly in many fields. These algorithms speak of the problem of imbalanced data, where there are situations that belong to more classes than others. Imbalanced data result in poor performance and bias to a class without other classes. In this paper, we proposed three techniques based on the Over-Sampling (O.S.) technique for processing imbalanced dataset and redistributing it and converting it into balanced dataset. These techniques are (Improved Synthetic Minority Over-Sampling Technique (Improved SMOTE), Border
... Show MoreSteganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality
... Show More