Preferred Language
Articles
/
ahd4apIBVTCNdQwCPK8Y
Assessing the accuracy of 'crowdsourced' data and its integration with official spatial data sets
...Show More Authors

Scopus
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
The Effect of Temporal Resolution of Climatic Factors on Agriculture Degradation in Southern Baghdad by Applying Remote Sensing Data
...Show More Authors

       The climate changes had been recognized as one of the major factors responsible for land degradation, which has a significant impact on diverse aspects. The present study aims to estimate how the climate change can influence land degradation in the south areas of Baghdad province (Al-Rasheed, Al-Mahmudiyah, Al-Yusufiyah, Al-Madaen, and Al-Latifiyah). The Satellite Landsat-8 OLI and satellite Landsat-5 TM sensor imagery were used to extent land degradation for the period (2010-2019). ArcGIS V.10.4 was applied to manage and analysis the satellite image dataset, including the use of climate factors data from the European Center for Climate Forecasts (ECMWF) by reanalyzes and extraction datasets. To achieve work objectives, many

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Wed Jul 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Some Properties for the Restriction of P^*-field of Sets
...Show More Authors

The restriction concept is a basic feature in the field of measure theory and has many important properties. This article introduces the notion of restriction of a non-empty class of subset of the power set on a nonempty subset of a universal set. Characterization and examples of the proposed concept are given, and several properties of restriction are investigated. Furthermore, the relation between the P*–field and the restriction of the P*–field is studied, explaining that the restriction of the P*–field is a P*–field too. In addition, it has been shown that the restriction of the P*–field is not necessarily contained in the P*–field, and the converse is true. We provide a necessary condition for the P*–field to obtain th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 02 2024
Journal Name
Engineering, Technology & Applied Science Research
Two Proposed Models for Face Recognition: Achieving High Accuracy and Speed with Artificial Intelligence
...Show More Authors

In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen

... Show More
View Publication Preview PDF
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Estimation Pore and Fracture Pressure Based on Log Data; Case Study: Mishrif Formation/Buzurgan Oilfield at Iraq
...Show More Authors

Prediction of the formation of pore and fracture pressure before constructing a drilling wells program are a crucial since it helps to prevent several drilling operations issues including lost circulation, kick, pipe sticking, blowout, and other issues. IP (Interactive Petrophysics) software is used to calculate and measure pore and fracture pressure. Eaton method, Matthews and Kelly, Modified Eaton, and Barker and Wood equations are used to calculate fracture pressure, whereas only Eaton method is used to measure pore pressure. These approaches are based on log data obtained from six wells, three from the north dome; BUCN-52, BUCN-51, BUCN-43 and the other from the south dome; BUCS-49, BUCS-48, BUCS-47. Along with the overburden pr

... Show More
Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Estimation Pore and Fracture Pressure Based on Log Data; Case Study: Mishrif Formation/Buzurgan Oilfield at Iraq
...Show More Authors

Prediction of the formation of pore and fracture pressure before constructing a drilling wells program are a crucial since it helps to prevent several drilling operations issues including lost circulation, kick, pipe sticking, blowout, and other issues. IP (Interactive Petrophysics) software is used to calculate and measure pore and fracture pressure. Eaton method, Matthews and Kelly, Modified Eaton, and Barker and Wood equations are used to calculate fracture pressure, whereas only Eaton method is used to measure pore pressure. These approaches are based on log data obtained from six wells, three from the north dome; BUCN-52, BUCN-51, BUCN-43 and the other from the south dome; BUCS-49, BUCS-48, BUCS-47. Along with the overburden pressur

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 06 2004
Journal Name
Iraqi Journal Of Science
Cluster and factor analyses R and Q mode technique of geochemical and petrological data of the Shalair Metamorphic Rock Group, Shalair Valley area, Northeastern Iraq
...Show More Authors

Publication Date
Sun Oct 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A novel data offloading scheme for QoS optimization in 5G based internet of medical things
...Show More Authors

The internet of medical things (IoMT), which is expected the lead to the biggest technology in worldwide distribution. Using 5th generation (5G) transmission, market possibilities and hazards related to IoMT are improved and detected. This framework describes a strategy for proactively addressing worries and offering a forum to promote development, alter attitudes and maintain people's confidence in the broader healthcare system without compromising security. It is combined with a data offloading system to speed up the transmission of medical data and improved the quality of service (QoS). As a result of this development, we suggested the enriched energy efficient fuzzy (EEEF) data offloading technique to enhance the delivery of dat

... Show More
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Iraqi Journal Of Science
Comparison Different Estimation Method for Reliability Function of Rayleigh Distribution Based On Fuzzy Lifetime Data
...Show More Authors

    In this study, we present different methods of estimating fuzzy reliability of a two-parameter Rayleigh distribution via the maximum likelihood estimator, median first-order statistics estimator, quartile estimator, L-moment estimator, and mixed Thompson-type estimator. The mean-square error MSE as a measurement for comparing the considered methods using simulation through different values for the parameters and unalike sample sizes is used. The results of simulation show that the fuzziness values are better than the real values for all sample sizes, as well as  the fuzzy reliability at the estimation  of the Maximum likelihood Method, and Mixed Thompson Method perform better than the other methods in the sense of MSE, so that

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sat Feb 27 2021
Journal Name
Iraqi Journal Of Science
Application of Velocity Analysis Picking for 2D Seismic Data Processing in West An-Najaf Are
...Show More Authors

     In the current study, 2D seismic data in west An-Najaf (WN-36 line) were received after many steps of processing by Oil Exploration Company in 2018. Surface Consistent Amplitude Compensation (SCAC) was applied on the seismic data. The processing sequence in our study started by sorting data in a common mid-point (CMP) gather, in order to apply the velocity analysis using Interactive Velocity Analysis Application (INVA) with Omega system. Semblance of velocity was prepared to preform normal move-out (NMO) vs. Time. Accurate root mean square velocity (VRMS) was selected, which was controlled by flatness of the primary events. The resultant seismic velocity section for the study area shows that the veloci

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref