The technology of change detection is a technique by which changes are verified in a certain time period. Remote sensing images are used to detect changes in agriculture land for the selected study area located south of Baghdad governorate in Agricultural Division of AL-Rasheed district because this method is very effective for assessing change compared to other traditional scanning techniques. In this research two remotely sensed images for the study area were taken by Landsat 8 and Sentinel-2, the difference between them is one month to monitor the change in the winter crops, especially the wheat crop, where the agriculture began for the wheat crop there in the Agricultural Division of AL-Rasheed district at 15/11/2018. The first preprocessing procedure was the extraction of the NDVI (Normalized Difference Vegetation Index) values for the two scenes of Landsat 8 and the two scenes of Sentinel-2B and then using the change detection between them to compare the changes in agriculture land. Also, change detection was implemented between NIR bands because they are most severely affected by biomass or the amount of available chlorophyll-containing in plant structures. The results of the change detection for Sentinel-2B were more accurate than for the Landsat 8 as demonstrated by field visits for the study area, where the changes in the distribution of vegetal cover (wheat and other winter crops) were clear and accurate in the image of Sentinel-2B, as opposed to Landsat's 8 image, where the variation in vegetation cover was not accurate, especially for the change detection between NIR bands.
The absorption spectrum for three types of metal ions in different concentrations has been studying experimentally and theoretically. The examination model is by Gaius model in order to find the best fitting curve and the equation controlled with this behavior. The three metal ions are (Copper chloride Cu+2, Iron chloride Fe+3, and Cobalt chloride Co+2) with different concentrations (10-4, 10-5, 10-6, 10-7) gm/m3. The spectroscopic study included UV-visible and fluorescence spectrum for all different concentrations sample. The results refer to several peaks that appear from the absorption spectrum in the high concentration of all metal ions solution.
... Show MoreComplexes of 1-phenyl-3-(2(-5-(phenyl amino)-1,3,4-thiadiazole-2-yl)phenyl) thiourea have been prepared and characteizedby elemental analysis, Ff-[R, and u.v./ visible spectra moreover,determination of metal content M%o by flame atomic absorptionspectroscopy, molar conductance in DMSO solution and magneticmoments (peffl.The result showed that the ligand (L) was coordinated to Mn+2, Ni+2,Ct+2,2n+2,Cd+2, and Hg+2 ions through the nitrogen atoms and sulpheratoms.From the result obtained, rhe following general formula [MLCl2] hasbeen given for the prepared complexes with an octahedral geometryaround the metal ions for all complexes.where M= Mn+2, Ni+2, cu+2, zn+2, cd+2, and Hg+2 l= l-phenyl-3-(2-(5-(phenyl amino
... Show MoreThe existing investigation explains the consequence of irradiation of violet laser on the structure properties of MawsoniteCu6Fe2SnS8 [CFTS] thin films. The film was equipped by the utilization of semi-computerized spray pyrolysis technique (SCSPT), it is the first time that this technique is used in the preparation and irradiation using a laser. when the received films were processed by continuous red laser (700 nm) with power (>1000mW) for different laser irradiation time using different number of times a laser scan (0, 6, 9, 12, 15 and 18 times) with total irradiation time (0,30,45,60,75,90 min) respectively at room temperature.. The XRD diffraction gave polycrysta
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreBackground and Aim. Coronary artery disease (CAD) is a major risk factor for the progression to heart failure (HF), which is associated with an increase in left ventricular volume (LVV). This study aims to measure ventricular function and myocardial perfusion imaging markers of the left side of the heart, which can be performed with injection of a 99mTc at stress and rest by using single-photonemission-computed-tomography (SPECT). Subject and methods. The study included 121 patients with CAD, comprising 53 females and 68 males with ages between 25 to 88 years and 265 healthy subjects comprising 84 males and 181 females. All patients and healthy subjects volunteered to participate in this study. They were classified according to
... Show MoreWe introduce in this paper, the notion of a 2-quasì-prime module as a generalization of quasi-prime module, we know that a module E over a ring R is called quasi-prime module, if (0) is quasi-prime submodule. Now, we say that a module E over ring R is a 2-quasi-prime module if (0) is 2-quasi-prime submodule, a proper submodule K of E is 2-quasi-prime submodule if whenever , and , then either or .
Many results about these kinds of modules are obtained and proved, also, we will give a characterization of these kinds of modules.
Let R be a commutative ring with 10 and M is a unitary R-module . In this paper , our aim is to continue studying 2-absorbing submodules which are introduced by A.Y. Darani and F. Soheilina . Many new properties and characterizations are given .
An R-module M is called a 2-regular module if every submodule N of M is 2-pure submodule, where a submodule N of M is 2-pure in M if for every ideal I of R, I2MN = I2N, [1]. This paper is a continuation of [1]. We give some conditions to characterize this class of modules, also many relationships with other related concepts are introduced.
Epilepsy is one of the most common diseases of the nervous system around the world, affecting all age groups and causing seizures leading to loss of control for a period of time. This study presents a seizure detection algorithm that uses Discrete Cosine Transformation (DCT) type II to transform the signal into frequency-domain and extracts energy features from 16 sub-bands. Also, an automatic channel selection method is proposed to select the best subset among 23 channels based on the maximum variance. Data are segmented into frames of one Second length without overlapping between successive frames. K-Nearest Neighbour (KNN) model is used to detect those frames either to ictal (seizure) or interictal (non-
... Show MoreIn modern years, internet and computers were used by many nations all overhead the world in different domains. So the number of Intruders is growing day-by-day posing a critical problem in recognizing among normal and abnormal manner of users in the network. Researchers have discussed the security concerns from different perspectives. Network Intrusion detection system which essentially analyzes, predicts the network traffic and the actions of users, then these behaviors will be examined either anomaly or normal manner. This paper suggested Deep analyzing system of NIDS to construct network intrusion detection system and detecting the type of intrusions in traditional network. The performance of the proposed system was evaluated by using
... Show More