This study was conducted on Lake Hamrin situated in Diyala governorate, focal Iraq, between latitudes 44º 53ʹ 26.16 '- 45º 07 ʹ 28.03ʺ and 34º 04ʹ 24.75ʺ ــ 34º 19ʹ 12.74ʺ . As in this study, the surface area of Hamrin Lake was calculated from satellite images during the period from October 2019 to September 2020, with an average satellite image for each month, furthermore,by utilizing the Normalized Differences Water Index (NDWI), the largest surface area was 264,617 km2 for October and the lowest surface area 140.202 km2 for September. The surface temperature of the lake water was also calculated from satellite images of the Landsat 8 satellite, based on ban
... Show MoreDue to the large size of dealing in the transactions installment sales in durable products, especially real estate given the privacy to enjoy their property, among other products because of the large amount and the length of the repayment period leading to a risk of non-payment by the buyer because of the possibility to change the credit level to him, especially that most of this type of transaction customers are from limited income owners, So it has been proposed the use of other transactions in handling real estate instead of installment sales transactions, a rental sale transactions because of the protection provided by this transaction for a vendor that will be mentioned later.
So proposes to st
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreSome esters were prepared from reaction of different molecular weight of PVA with some acid chloride (prepared by reaction of acid with thionyl chloride or phosphorous pentachloride)in the presence of pyridine. The thermal and reological properties were studied. The increasing Of bulky groups decreasing stability of the thermal and reological properties.
Medical image segmentation is one of the most actively studied fields in the past few decades, as the development of modern imaging modalities such as magnetic resonance imaging (MRI) and computed tomography (CT), physicians and technicians nowadays have to process the increasing number and size of medical images. Therefore, efficient and accurate computational segmentation algorithms become necessary to extract the desired information from these large data sets. Moreover, sophisticated segmentation algorithms can help the physicians delineate better the anatomical structures presented in the input images, enhance the accuracy of medical diagnosis and facilitate the best treatment planning. Many of the proposed algorithms could perform w
... Show MoreIn this paper two modifications on Kuznetsov model namely on growth rate law and fractional cell kill term are given. Laplace Adomian decomposition method is used to get the solution (volume of the tumor) as a function of time .Stability analysis is applied. For lung cancer the tumor will continue in growing in spite of the treatment.
Due to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.
Frequently, Load associated mode of failure (rutting and fatigue) as well as, occasionally, moisture damage in some sections poorly drained are the main failure types found in some of the newly constructed road within Baghdad as well as other cities in Iraq. The use of hydrated lime in pavement construction could be one of the possible steps taken in the direction of improving pavement performance and meeting the required standards. In this study, the mechanistic properties of asphalt concrete mixes modified with hydrated lime as a partial replacement of limestone dust mineral filler were evaluated. Seven replacement rates were used; 0,0.5, 1, 1.5, 2, 2.5 and 3 percent by weight of aggregate. Asphalt concrete mixes were prepared at their
... Show More