Image of landsate-7 taken by thematic mapper was used and classified using supervised method. Results of supervised classification indicated presence of nine land cover classes. Salt-soils class shows the highest reflectance value while water bodies' class shows the lowest values. Also the results indicated that soil properties show different effects on reflectance. There was a high significant positive relation of carbonate, gypsum, electric conductivity and silt content, while there was a week positive relation with sand and negative relation with organic matter, water content, bulk density and cataion exchange capacity.
Image of landsate-7 taken by thematic mapper was used and classified using supervised method. Results of supervised classification indicated presence of nine land cover classes. Salt-soils class shows the highest reflectance value while water bodies' class shows the lowest values. Also the results indicated that soil properties show different effects on reflectance. There was a high significant positive relation of carbonate, gypsum, electric conductivity and silt content, while there was a week positive relation with sand and negative relation with organic matter, water content, bulk density and cataion exchange capacity.
Due to the availability of technology stemming from in-depth research in this sector and the drawbacks of other identifying methods, biometrics has drawn maximum attention and established itself as the most reliable alternative for recognition in recent years. Efforts are still being made to develop a user-friendly system that is up to par with security-system requirements and yields more reliable outcomes while safeguarding assets and ensuring privacy. Human age estimation and Gender identification are both challenging endeavours. Biomarkers and methods for determining biological age and gender have been extensively researched, and each has advantages and disadvantages. Facial-image-based positioning is crucial for many application
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreENGLISH
English
In these recent years, the world has witnessed a kind of social exclusion and the inability to communicate directly due to the Corona Virus Covid 19 (COVID-19) pandemic, and the consequent difficulty of communicating with patients with hospitals led to the need to use modern technology to solve and facilitate the problem of people communicating with each other. healthcare has made many remarkable developments through the Internet of things (IOT) and cloud computing to monitor real-time patients' data, which has enabled many patients' lives to be saved. this paper presents the design and implementation of a Private Backend Server Software based on an IoT health monitoring system concerned emergency medical services utilizing biosenso
... Show More