Preferred Language
Articles
/
ijs-12177
Agriculture Cadaster Map of Al-Shehimea
...Show More Authors

The cadastral map is very important because it has technical and materialist
specification of the property borders and these maps which are land registration
based on it in Iraq, the problem is an ancient maps and unfit for use, despite its
importance, Therefor the updating and digitize the cadastral map is very pivotal, this
is what we have done in the present work.
In the present work, we have an old cadastral map (as a paper) was made in 1932
with modern satellite image (Quick Bird ) 2006, which has 61 cm resolution for the
same area after. Geometric correction technique has been applied by using image-toimage
method or (image registration ) and after that we get new agricultural cadaster
map and connect them with their own the information for the study area (shehimea)
in the medial of Iraq. So that we get new digital cadastral map from old map and
satellite image. This research is carried out by using programs ERDAS and ArcGIS.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
Notes on Relative Contact Equivalence of Complex Analytic Map-Germs
...Show More Authors

In these notes, our goal is to give some results on criterion for complex analytic map-germs by their tangent spaces with respect to -equivalence where is the module of complex analytic vector fields on .In addition, we give some results about -trivial analytic family, the direct product and direct sum of map-germs.

View Publication Preview PDF
Publication Date
Tue Mar 15 2016
Journal Name
Asian Journal Of Applied Sciences
A Review: Training Requirement of Agriculture Extension Officers in Iraq
...Show More Authors

View Publication
Scopus (18)
Crossref (10)
Scopus Crossref
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
Chaos-based Color Image Steganography Method Using 3 D Cat Map
...Show More Authors

     Steganography is a technique to hide a secret message within a different multimedia carrier so that the secret message cannot be identified. The goals of steganography techniques include improvements in imperceptibility, information hiding, capacity, security, and robustness. In spite of numerous secure methodologies that have been introduced, there are ongoing attempts to develop these techniques to make them more secure and robust. This paper introduces a color image steganographic method based on a secret map, namely 3-D cat. The proposed method aims to embed data using a secure structure of chaotic steganography, ensuring better security. Rather than using the complete image for data hiding, the selection of

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Mar 28 2018
Journal Name
Iraqi Journal Of Science
Image Content Verification based on DWT and Chaotic Map Watermarking
...Show More Authors

     Image content verification is to confirm the validity of the images, i.e. . To test if the image has experienced any alteration since it was made. Computerized watermarking has turned into a promising procedure for image content verification in light of its exceptional execution and capacity of altering identification.

     In this study, a new scheme for image verification reliant on two dimensional chaotic maps and Discrete Wavelet Transform (DWT) is introduced. Arnold transforms is first applied to Host image (H) for scrambling as a pretreatment stage, then the scrambled host image is partitioned into sub-blocks of size 2×2 in which a 2D DWT is utilized on  ea

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 02 2021
Journal Name
Iraqi Journal Of Science
An Approach Based on Decision Tree and Self-Organizing Map For Intrusion Detection
...Show More Authors

In modern years, internet and computers were used by many nations all overhead the world in different domains. So the number of Intruders is growing day-by-day posing a critical problem in recognizing among normal and abnormal manner of users in the network. Researchers have discussed the security concerns from different perspectives. Network Intrusion detection system which essentially analyzes, predicts the network traffic and the actions of users, then these behaviors will be examined either anomaly or normal manner. This paper suggested Deep analyzing system of NIDS to construct network intrusion detection system and detecting the type of intrusions in traditional network. The performance of the proposed system was evaluated by using

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
Iteration for a Non-Self -Strongly Pseudocontractive Map
...Show More Authors

Let be a Banach space, be a nonempty closed convex subset of , and be self
nonexpansive map. The sequence generated by the iterative method
, where be a contractive mapping
and is a sequence in We generalize the mapping to non-sel -Strongly
Pseudocontractive .

View Publication Preview PDF
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
Estimation the levels of some heavy metals in the soil and vegetables irrigated with wells water in some agriculture fields at Al- Dora district – Baghdad
...Show More Authors

Heavy metals are currently of much environmental concern. The contamination by heavy metals in plants and water is one of the major issues to be faced throughout the world. This research is tried to estimate levels of heavy metals in vegetative crops and soil irrigated with well water (as alternative source for irrigation). Samples of well water, soil and vegetative crops were collected from agriculture fields at Al-Dora district in Baghdad. Physico-chemical parameters (pH, EC, TDS and Salinity) were measured for water and (pH, EC and salinity) for soil samples. Estimation of Lead (Pb), Nickle (Ni), Zinc (Zn) and Iron (Fe) concentrations in water, vegetable crops (Raphanus sativus, Apium graveoleus, Beta vulgaris, Allium ampeloprasum, Le

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 31 2017
Journal Name
Journal Of Engineering
Urban agriculture as one of the ecological applications of the regenerative city
...Show More Authors

Recently, several concepts and expressions have emerged that have often preoccupied the world . around the concept of environment and sustainability. This is due to the negative and irresponsible impact of man and his innovations in various industrial and technological fieldsthat have damaged the natural environment. Architecture and cities at the broader level are some of the man made components that caused these negative impacts and in the same time affected by them. What distinguishes architectural and urban projects is the consumption of large . quantities of natural resources and production larger amounts of waste and pollution, along the life of these projects. At the end of the twentieth century and the beginning of the twenty-fir

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Iraqi Journal Of Soil Science
EFFECTIVE USE OF FERTILIZERS AND ANALYSIS OF SOIL USING PRECISION AGRICULTURE TECHNIQUES
...Show More Authors

Soil fertility is a crucial factor in measuring soil quality, it indicates the extent to which soil can support plant life. Soil fertility is measured by the amount of macro and micronutrients, pH, etc. Soil nutrients are depleted after each harvest and therefore must be added. To maintain soil nutrient levels, fertilizer is added to the soil. Adding fertilizer in the precise amount is a matter of great importance because excess or insufficient application can harm plant life and reduce productivity. The use of modern technology is a solution to this problem. Although automated techniques for sowing, weeding, crop harvesting, etc. have been proposed and implemented, none of the techniques are aimed to maintaining soil fertility. The study a

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (16)
Crossref (8)
Scopus Crossref