Change detection is a technology ascertaining the changes of
specific features within a certain time Interval. The use of remotely
sensed image to detect changes in land use and land cover is widely
preferred over other conventional survey techniques because this
method is very efficient for assessing the change or degrading trends
of a region. In this research two remotely sensed image of Baghdad
city gathered by landsat -7and landsat -8 ETM+ for two time period
2000 and 2014 have been used to detect the most important changes.
Registration and rectification the two original images are the first
preprocessing steps was applied in this paper. Change detection using
NDVI subtractive has been computed, subtractive between the bands
of the two images and the ratio of the red to blue bands was also
computed. Change detection mask using minimum distance
classification or detection after classification have be also used to
compute the changes between the resultant classes, many statistical
properties of the original and process image have been illustrated in
this research
Significant advances in the automated glaucoma detection techniques have been made through the employment of the Machine Learning (ML) and Deep Learning (DL) methods, an overview of which will be provided in this paper. What sets the current literature review apart is its exclusive focus on the aforementioned techniques for glaucoma detection using the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA) guidelines for filtering the selected papers. To achieve this, an advanced search was conducted in the Scopus database, specifically looking for research papers published in 2023, with the keywords "glaucoma detection", "machine learning", and "deep learning". Among the multiple found papers, the ones focusing
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe educational sector is one of the important sectors in the world, and it is considered one of the means of community development. In addition, it is one of the means of making the country’s renaissance and devel-opment because it represents the factory of thinking minds that make change. There is no doubt that this sector is the same as any other sector. The deficit in the studied scientific planning has been prolonged, which led to its deterioration, and the problems of education remain diverse and inherited from previous time periods, where the hierarchical cluster analysis was used on postgraduate students in universities in Iraq, except for Kurdistan region, and the number of universities that were included in the study was
... Show MoreIn this paper, we will discuss the performance of Bayesian computational approaches for estimating the parameters of a Logistic Regression model. Markov Chain Monte Carlo (MCMC) algorithms was the base estimation procedure. We present two algorithms: Random Walk Metropolis (RWM) and Hamiltonian Monte Carlo (HMC). We also applied these approaches to a real data set.
Each book has a specific style in which its author walks on it from its beginning to its end, and the Holy Qur’an is a book that compiled many methods that were indicative of its miracle, and that it is one unit even though it has been astrologer for twenty-three years.
There is no doubt that knowledge of the Qur’anic methods is one of the pillars of the approach that deals with any of the Qur’an, and the multiplicity of Qur’anic methods is a fact that has many causes. It has been expressed by the Qur’anic discharge and the conjugation of verses to bring them to different methods, and on multiple forms such as nominal, actual, singular Qur’an, presentation, delay, deletion, mention, abbreviation and redundancy. The Qur'ani
The research has been concerned with the modalities of foreign trade payments (foreign trade financing), and made an accounting comparison between them to choose the best way to pay for the imported goods (payment of the real values of imported goods), given the importance of the impact of this activity on the national economy of all countries of the world, especially Iraq for the adoption of a very large amount of imported goods to meet the requirements of the people, which require the flow of huge amounts of foreign currency outside Iraq to pay for these goods, and therefore dealing incorrectly with it leads to the destruction of the national economy and the spread of a number of negative social and economic phenomena of
... Show MoreMultivariate Non-Parametric control charts were used to monitoring the data that generated by using the simulation, whether they are within control limits or not. Since that non-parametric methods do not require any assumptions about the distribution of the data. This research aims to apply the multivariate non-parametric quality control methods, which are Multivariate Wilcoxon Signed-Rank ( ) , kernel principal component analysis (KPCA) and k-nearest neighbor ( −
The design processes in general and the design system in particular need to be studied and knowledge. Based on this vision, we find the need for constant research on the design processes, and the subject of the techniques of the designs of the covers of children magazines did not have the view of the researchers to make them the subject of study, For the subject of this research, the problem of research is determined according to the following question:
- What are the methods used in designing children magazine covers in Iraq?
Through this research we seek to find solutions to this question as well as it will serve the cognitive side of a modern study and development of a broader understanding of the subject. Through four
... Show MoreThe extraction of Basil oil from Iraqi Ocimum basillicum leaves using n-hexane and petroleum ether as organic solvents were studied and compared. The concentration of oil has been determined in a variety of extraction temperatures and agitation speed. The solvent to solid ratio effect has been studied in order to evaluate the concentration of Ocimum basillicum oil. The optimum experimental conditions for the oil extraction were established as follows: n-hexane as organic solvent, 60 °C extraction temperature, 300 rpm agitation speed and 40:1mL:g amount of solvent to solid ratio.