Preferred Language
Articles
/
ijs-5054
The Modern Techniques in Spatial Analysis to Isolate, Quarantine the Affected Areas and Prevent the Spread of COVID-19 Epidemic
...Show More Authors

      COVID-19 is a disease caused by a coronavirus spread globally, including in Iraq; infections have appeared on all Iraq lands in varying proportions. Iraq is among the higher infected world countries. Forty-six infections were simulated on 23 March 2020. Injuries on the eastern side of Baghdad city and to the right side of the Tigris River, which divides the city into two parts, are a natural barrier in quarantine and easily control the movement of people from both sides.

In this study, a model was considered a scientific and practical method by following the steps of identifying infected people using the best scientific approach for the spatial process to prevent the virus from spreading. Remote sensing techniques were used as simulations of actual reality by depending on databases from the Iraqi government (Crisis Cell Dept.), tabulating data, and projecting them on virtual maps. Theories and statistical methods were applied in geospatial data analysis by managing these tools and capabilities of geographic information systems.

The locations of the infected people were identified to control the spread of the Coronavirus. Two primary groups were identified and analyzed according to real spatial analysis techniques to facilitate control of the region in case of increasing numbers of infected people and control of the region’s residents; later, the epidemic broke out.

The first group included the regions (New Baghdad, Al-Ghadeer, Al-Zafaraniya, Al-Amin, Al-Amin, and Karrada), and the second group included the regions (the Tariq neighborhood, Sadr City, Al-Kabir, and Al-Ghozlan). Baghdad city was isolated into two parts by a natural barrier: the Tigris River, Baghdad Rusafa in Baghdad, and Al-Karkh. There is another natural barrier if the epidemic is spread more than the normal state: a water channel (Al-Jayesh Channel) and an international highway (Muhammad Al Qasim).

These natural measures and barriers are an ideal model for controlling epidemic spreading, optimizing health capabilities and protection teams, and limiting population movement to prevent the spread of the Coronavirus Covid-19.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Apr 01 2020
Journal Name
Plant Archives
Land cover change detection using satellite images based on modified spectral angle mapper method
...Show More Authors

This research depends on the relationship between the reflected spectrum, the nature of each target, area and the percentage of its presence with other targets in the unity of the target area. The changes occur in Land cover have been detected for different years using satellite images based on the Modified Spectral Angle Mapper (MSAM) processing, where Landsat satellite images are utilized using two software programming (MATLAB 7.11 and ERDAS imagine 2014). The proposed supervised classification method (MSAM) using a MATLAB program with supervised classification method (Maximum likelihood Classifier) by ERDAS imagine have been used to get farthest precise results and detect environmental changes for periods. Despite using two classificatio

... Show More
Scopus (2)
Scopus
Publication Date
Tue Jan 18 2022
Journal Name
Iraqi Journal Of Science
Image Encryption Based on Intelligent Session Mask Keys
...Show More Authors

The revolution of multimedia has been a driving force behind fast and secured data transmission techniques. The security of image information from unapproved access is imperative. Encryptions technique is used to transfer data, where each kind of data has its own special elements; thus various methods should to be used to conserve distributing the image. This paper produces image encryption improvements based on proposed an approach to generate efficient intelligent session (mask keys) based on investigates from the combination between robust feature for ECC algebra and construction level in Greedy Randomized Adaptive Search Procedure (GRASP) to produce durable symmetric session mask keys consist of ECC points. Symmetric behavior for ECC

... Show More
View Publication Preview PDF
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Experimental Study for Materials Prosthetic above Knee Socket under Tensile or Fatigue Stress with Varying Temperatures Effect
...Show More Authors

The residual limb within the prosthesis, is often subjected to tensile or fatigue stress with varying temperatures. The fatigue stress and temperatures difference which faced by amputee during his daily activities will produces an environmental media for growth of fungi and bacteria in addition to the damage that occurs in the prosthesis which minimizingthe life of the prosthetic limb and causing disconfirm feeling for the amputee.

In this paper, a mechanical and thermal properties of composite materials prosthetic socket made of different lamination for perlon/fiber glass/perlon, are calculated by using tesile test device under varying temperatures ( from 20oC to 60oC), also in this paper a device for measuring rotational bendin

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Advances In Physics Theories And Applications
Adsorption Study of Symmetrical Schiff Base Ligand 4,4’-[hydrazine-1,2-diylidenebis(methan-1-yl-1-ylidene) bis (2-methoxyphenol)] on Granulated Initiated Calcined Iraqi Montmorillonite via Columnar Method.
...Show More Authors

The adsorption ability of Iraqi initiated calcined granulated montmorillonite to adsorb Symmetrical Schiff Base Ligand 4,4’-[hydrazine-1, 2-diylidenebis (methan-1-yl-1-ylidene)) bis (2-methoxyphenol)] derived from condensation reaction of hydrazine hydrate and 4-hydroxy-3-methoxybenzaldehyde, from aqueous solutions has been investigated through columnar method.The ligand (H2L) adsorption found to be dependent on adsorbent dosage, initial concentration and contact time.All columnar experiments were carried out at three different pH values (5.5, 7and 8) using buffer solutions at flow rate of (3 drops/ min.),at room temperature (25±2)°C. The experimental isotherm data were analyzed using Langmuir, Freundlich and Temkin equations. The monol

... Show More
Preview PDF
Publication Date
Wed Jul 05 2017
Journal Name
Chemical Engineering Communications
Microwave-assisted preparation of mesoporous-activated carbon from coconut (<i>Cocos nucifera</i>) leaf by H<sub>3</sub>PO<sub>4</sub>activation for methylene blue adsorption
...Show More Authors

View Publication
Scopus (100)
Crossref (96)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Modern Mathematical Sciences
Coupled Laplace-Decomposition Method for Solving Klein- Gordon Equation
...Show More Authors

In this paper, we consider a new approach to solve type of partial differential equation by using coupled Laplace transformation with decomposition method to find the exact solution for non–linear non–homogenous equation with initial conditions. The reliability for suggested approach illustrated by solving model equations such as second order linear and nonlinear Klein–Gordon equation. The application results show the efficiency and ability for suggested approach.

Preview PDF
Publication Date
Tue Dec 26 2017
Journal Name
Al-khwarizmi Engineering Journal
Fuzzy Wavenet (FWN) classifier for medical images
...Show More Authors

 

    The combination of wavelet theory and neural networks has lead to the development of wavelet networks. Wavelet networks are feed-forward neural networks using wavelets as activation function. Wavelets networks have been used in classification and identification problems with some success.

  In this work we proposed a fuzzy wavenet network (FWN), which learns by common back-propagation algorithm to classify medical images. The library of medical image has been analyzed, first. Second, Two experimental tables’ rules provide an excellent opportunity to test the ability of fuzzy wavenet network due to the high level of information variability often experienced with this type of images.

&n

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 05 2010
Journal Name
Baghdad Science Journal
ON M- Hollow modules
...Show More Authors

Let R be associative ring with identity and M is a non- zero unitary left module over R. M is called M- hollow if every maximal submodule of M is small submodule of M. In this paper we study the properties of this kind of modules.

View Publication Preview PDF
Crossref
Publication Date
Fri Sep 30 2022
Journal Name
College Of Islamic Sciences
Shariah ruling on advice
...Show More Authors

Abstract

Research title: The legal ruling of advice.

This research deals with the topic of advice, as the research included the following:

Preamble: I explained in it the meaning of advice in the Qur’an and Sunnah, and that what is meant by it is a good performance of the duty, then explaining its importance, importing it, and the difference between advice and what is similar to it, from enjoining good, denial, reproach and reprimand, backbiting and the will.

The first topic: It dealt with the ruling on advice, whether it is recommended or disliked, or forbidden, because what is meant by it is to give advice to others may be an obligation in kind, or it may be desirable or dislike

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref