A band rationing method is applied to calculate the salinity index (SI) and Normalized Multi-Band Drought Index (NMDI) as pre-processing to take Agriculture decision in these areas is presented. To separate the land from other features that exist in the scene, the classical classification method (Maximum likelihood classification) is used by classified the study area to multi classes (Healthy vegetation (HV), Grasslands (GL), Water (W), Urban (U), Bare Soil (BS)). A Landsat 8 satellite image of an area in the south of Iraq are used, where the land cover is classified according to indicator ranges for each (SI) and (NMDI).
Improved Merging Multi Convolutional Neural Networks Framework of Image Indexing and Retrieval
Background/Objectives: The purpose of current research aims to a modified image representation framework for Content-Based Image Retrieval (CBIR) through gray scale input image, Zernike Moments (ZMs) properties, Local Binary Pattern (LBP), Y Color Space, Slantlet Transform (SLT), and Discrete Wavelet Transform (DWT). Methods/Statistical analysis: This study surveyed and analysed three standard datasets WANG V1.0, WANG V2.0, and Caltech 101. The features an image of objects in this sets that belong to 101 classes-with approximately 40-800 images for every category. The suggested infrastructure within the study seeks to present a description and operationalization of the CBIR system through automated attribute extraction system premised on CN
... Show MoreImage segmentation using bi-level thresholds works well for straightforward scenarios; however, dealing with complex images that contain multiple objects or colors presents considerable computational difficulties. Multi-level thresholding is crucial for these situations, but it also introduces a challenging optimization problem. This paper presents an improved Reptile Search Algorithm (RSA) that includes a Gbest operator to enhance its performance. The proposed method determines optimal threshold values for both grayscale and color images, utilizing entropy-based objective functions derived from the Otsu and Kapur techniques. Experiments were carried out on 16 benchmark images, which inclu
In the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud serv
... Show MoreIn this study, phosphorescence analysis (KPA) is used for determining soil collected from the Tigris River from Al- Karrada and Bab Al-Sharq in Baghdad and samples were taken from rainwater collected from Al-Rashad, Al-Obeidi, Al-Dora and Al-Sadr City in Baghdad. The measurements were carried out by the Iraqi Ministry of Health and Environment, in the Radiation Protection Center. The collection, removal and evaporation of the samples ranged from January to the end of March 2018. The results show the presents of concentration of 238U and 235U in soil samples and the rainwater samples. The conclusion of this work is the concentration of uranium in soil samples is more than recommendations by ICRP value of 1.9 μg /l. While all water sample
... Show MoreSince the beginning of the last century, the competition for water resources has intensified dramatically, especially between countries that have no agreements in place for water resources that they share. Such is the situation with the Euphrates River which flows through three countries (Turkey, Syria, and Iraq) and represents the main water resource for these countries. Therefore, the comprehensive hydrologic investigation needed to derive optimal operations requires reliable forecasts. This study aims to analysis and create a forecasting model for data generation from Turkey perspective by using the recorded inflow data of Ataturk reservoir for the period (Oct. 1961 - Sep. 2009). Based on 49 years of real inflow data
... Show MoreIn the early 90s military operations and United Nations Special Commission “UNSCOM” teams have been destroyed the past Iraqi chemical program. Both operations led an extensive number of scattered remnants of contaminated areas. The quantities of hazardous materials, incomplete destructed materials, and toxic chemicals were sealed in two bunkers. Deficiency of appropriate destruction technology led to spreading the contamination around the storage site. This paper aims to introduce the environmental detection of the contamination in the storage site area using geospatial analysis technique. The environmental contamination level of nutrients and major ions such as sulphate (SO4), potassium (K), sodium (Na), magnesi
... Show MoreIn this research, the program SEEP / W was used to compute the value of seepage through the homogenous and non-homogeneous earth dam with known dimensions. The results show that the relationship between the seepage and water height in upstream of the dam to its length for saturated soil was nonlinear when the dam is homogenous. For the non-homogeneous dam, the relationship was linear and the amount of seepage increase with the height of water in upstream to its length. Also the quantity of seepage was calculated using the method of (Fredlund and Xing, 1994) and (Van Genuchten, 1980) when the soil is saturated – unsaturated, the results referred to that the higher value of seepage when the soil is saturated and the lowe
... Show MoreThe Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show More