Preferred Language
Articles
/
ijs-6951
Study of Land Cover Changes of Baghdad Using Multi-Temporal Landsat Satellite Images
...Show More Authors

The main goal of this work is study the land cover changes for "Baghdad city" over a period of (30) years using multi-temporal Landsat satellite images (TM, ETM+ and OLI) acquired in 1984, 2000, and 2015 respectively. In this work, The principal components analysis transform has been utilized as multi operators, (i.e. enhancement, compressor, and temporal change detector). Since most of the image band's information are presented in the first PCs image. Then, the PC1 image for all three years is partitioned into variable sized blocks using quad tree technique. Several different methods of classification have been used to classify Landsat satellite images; these are, proposed method singular value decomposition (SVD) using Visual Basic software and supervised method (Maximum likelihood Classifier) using ENVI 5.1 software are utilized in order to get the most accurate results and then compare the results of each method and calculate the land cover changes that have been taken place in years 2000 and 2015; comparing with 1984. The image classification of the study area resulted into five land cover types: Water body, vegetation, open land (Barren land), urban area "Residential I" and urban area "Residential II". The results from classification process indicated that water body, vegetation, open land and the urban area "Residential I" are increased, while the second type from urban area "Residential II" in decrease to year 2015 comparable with 1984. Despite use of many methods of classification, results of the proposed method proved its efficiency, where the classification accuracies for the (SVD) method are 81%, 78% and 80% for years 1984, 2000 and 2015 respectively.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 03 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Designing Feed Forward Neural Network for Solving Linear VolterraIntegro-Differential Equations
...Show More Authors

The aim of this paper, is to design multilayer Feed Forward Neural Network(FFNN)to find the approximate solution of the second order linear Volterraintegro-differential equations with boundary conditions. The designer utilized to reduce the computation of solution, computationally attractive, and the applications are demonstrated through illustrative examples.

View Publication Preview PDF
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
The Galerkin-Implicit Method for Solving Nonlinear Variable Coefficients Hyperbolic Boundary Value Problem
...Show More Authors

This paper has the interest of finding the approximate solution (APPS) of a nonlinear variable coefficients hyperbolic boundary value problem (NOLVCHBVP).  The given boundary value problem is written in its discrete weak form (WEFM) and proved  have a unique solution, which is obtained via the mixed Galerkin finite element with implicit method that reduces the problem to solve the Galerkin nonlinear algebraic system  (GNAS). In this part, the predictor and the corrector techniques (PT and CT, respectively) are proved at first convergence and then are used to transform  the obtained GNAS to a linear GLAS . Then the GLAS is solved using the Cholesky method (ChMe). The stability and the convergence of the method are stud

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Thu Jan 23 2025
Journal Name
المستودع الرقمي للاطاريح
نجاح منظمات الاعمال على وفق التوجه الريادي لتكنولوجيا المعلومات بحث ميداني لعينة من المصارف العراقية الخاصة == The Success of Business Organizations According To The Entrepreneurial Orientation For Information Technology An Field Research At Iraqi Private Banks
...Show More Authors

المستودع الرقمي العراقي. مركز المعلومات الرقمية التابع لمكتبة العتبة العباسية المقدسة

View Publication
Publication Date
Fri Feb 17 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Deploying Facial Segmentation Landmarks for Deepfake Detection
...Show More Authors

Deepfake is a type of artificial intelligence used to create convincing images, audio, and video hoaxes and it concerns celebrities and everyone because they are easy to manufacture. Deepfake are hard to recognize by people and current approaches, especially high-quality ones. As a defense against Deepfake techniques, various methods to detect Deepfake in images have been suggested. Most of them had limitations, like only working with one face in an image. The face has to be facing forward, with both eyes and the mouth open, depending on what part of the face they worked on. Other than that, a few focus on the impact of pre-processing steps on the detection accuracy of the models. This paper introduces a framework design focused on this asp

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Hybrid Fuzzy Logic and Artificial Bee Colony Algorithm for Intrusion Detection and Classification
...Show More Authors

In recent years, with the growing size and the importance of computer networks, it is very necessary to provide adequate protection for users data from snooping through the use of one of the protection techniques: encryption, firewall and intrusion detection systems etc. Intrusion detection systems is considered one of the most important components in the computer networks that deal with Network security problems. In this research, we suggested the intrusion detection and classification system through merging Fuzzy logic and Artificial Bee Colony Algorithm. Fuzzy logic has been used to build a classifier which has the ability to distinguish between the behavior of the normal user and behavior of the intruder. The artificial bee colony al

... Show More
View Publication Preview PDF
Publication Date
Sat May 08 2021
Journal Name
Iraqi Journal Of Science
Automated Deception Detection Systems, a Review
...Show More Authors

Humans use deception daily since it can significantly affect their life and provide a getaway solution for any undesired situation. Deception is either related to low-stakes (e.g. innocuous) or high-stakes (e.g. with harmful situations). Deception investigation importance has increased, and it became a critical issue over the years with the increase of security levels around the globe. Technology has made remarkable achievements in many human life fields, including deception detection. Automated deception detection systems (DDSs) are widely used in different fields, especially for security purposes. The DDS is comprised of multiple stages, each of which should be built/trained to perform intelligently so that the whole system can give th

... Show More
View Publication Preview PDF
Crossref (2)
Scopus Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Moving Objects Detection Based on Frequency Domain: image processing
...Show More Authors

In this research a proposed technique is used to enhance the frame difference technique performance for extracting moving objects in video file. One of the most effective factors in performance dropping is noise existence, which may cause incorrect moving objects identification. Therefore it was necessary to find a way to diminish this noise effect. Traditional Average and Median spatial filters can be used to handle such situations. But here in this work the focus is on utilizing spectral domain through using Fourier and Wavelet transformations in order to decrease this noise effect. Experiments and statistical features (Entropy, Standard deviation) proved that these transformations can stand to overcome such problems in an elegant way.

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Sun Aug 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
مقترح اسلوب IRWs الحصين لتقدير أنموذج الانحدار المقسم لحركة حمولة قاع نهر دجلة ونقطة التغيير لكمية تصريف المياه عند مدينة بغداد
...Show More Authors

              يتكون الانحدار المقسم من عدة أقسام تفصل بينها نقاط انتماء مختلفة، فتظهر حالة عدم التجانس الناشئة من عملية فصل الأقسام ضمن عينة البحث. ويهتم هذا البحث في تقدير موقع نقطة التغيير بين الأقسام وتقدير معلمات الأنموذج، واقتراح طريقة تقدير حصينة ومقارنتها مع بعض الطرائق المستعملة في الانحدار الخطي المقسم. وقد تم استعمال أحد الطرائق التقليدية (طريقة Muggeo) لإيجاد مقدرات الإمكان الأعظم بالأسلوب الت

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Solvability for Optimal Classical Continuous Control Problem Controlling by Quaternary Hyperbolic Boundary Value Problem
...Show More Authors

    This work is concerned with studying the solvability for optimal classical continuous control quaternary vector problem that controls by quaternary linear hyperbolic boundary value problem. The existence of the unique quaternary state vector solution for the quaternary linear hyperbolic boundary value problem  is studied and demonstrated by employing the method of Galerkin, where the classical continuous control quaternary vector  is Known. Also, the existence theorem of an optimal classical continuous control quaternary vector related to the quaternary linear hyperbolic boundary value problem is demonstrated. The existence of a unique solution to the adjoint quaternary linear hyperbolic boundary value problem a

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Semigroup Theory for Dual Dynamic Programming
...Show More Authors

In this paper, the nonclassical approach to dynamic programming for the optimal control problem via strongly continuous semigroup has been presented. The dual value function VD ( .,. ) of the problem is defined and characterized. We find that it satisfied the dual dynamic programming principle and dual Hamilton Jacobi –Bellman equation. Also, some properties of VD (. , .) have been studied, such as, various kinds of continuities and boundedness, these properties used to give a sufficient condition for optimality. A suitable verification theorem to find a dual optimal feedback control has been proved. Finally gives an example which illustrates the value of the theorem which deals with the sufficient condition for optimality.

<

... Show More
View Publication Preview PDF