Preferred Language
Articles
/
ijs-933
Change Detection between Landsat 8 images and Sentinel-2 images
...Show More Authors

     The technology of change detection is a technique by which changes are verified in a certain time period. Remote sensing images are used to detect changes in agriculture land for the selected study area located south of Baghdad governorate in Agricultural Division of AL-Rasheed district because this method is very effective for assessing change compared to other traditional scanning techniques. In this research two remotely sensed images for the study area were taken by Landsat 8 and Sentinel-2, the difference between them is one month to monitor the change in the winter crops, especially the wheat crop, where the agriculture began for the wheat crop there in the Agricultural Division of AL-Rasheed district at 15/11/2018. The first preprocessing procedure was the extraction of the NDVI (Normalized Difference Vegetation Index) values for the two scenes of Landsat 8 and the two scenes of Sentinel-2B and then using the change detection between them to compare the changes in agriculture land. Also, change detection was implemented between NIR bands because they are most severely affected by biomass or the amount of available chlorophyll-containing in plant structures. The results of the change detection for Sentinel-2B were more accurate than for the Landsat 8 as demonstrated by field visits for the study area, where the changes in the distribution of vegetal cover (wheat and other winter crops) were clear and accurate in the image of Sentinel-2B, as opposed to Landsat's 8 image, where the variation in vegetation cover was not accurate, especially for the change detection between NIR bands.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 01 2020
Journal Name
Iraqi Journal Of Physics
Theoretical Model for Spectroscopic Study of Cu+2, Co+2, and Fe+3 Dissolved in Ethanol with A Different Concentrations
...Show More Authors

The absorption spectrum for three types of metal ions in different concentrations has been studying experimentally and theoretically. The examination model is by Gaius model in order to find the best fitting curve and the equation controlled with this behavior. The three metal ions are (Copper chloride Cu+2, Iron chloride Fe+3, and Cobalt chloride Co+2) with different concentrations (10-4, 10-5, 10-6, 10-7) gm/m3. The spectroscopic study included UV-visible and fluorescence spectrum for all different concentrations sample. The results refer to several peaks that appear from the absorption spectrum in the high concentration of all metal ions solution.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2010
Journal Name
Al-mustansiriya Journal For Sciences And Education
Synthesis and Identification of metal complexes of 1-phenyl-3,(2-(5-phenyl amine-1,3,4-thiadiazole-2-yl) phenyl thiourea
...Show More Authors

Complexes of 1-phenyl-3-(2(-5-(phenyl amino)-1,3,4-thiadiazole-2-yl)phenyl) thiourea have been prepared and characteizedby elemental analysis, Ff-[R, and u.v./ visible spectra moreover,determination of metal content M%o by flame atomic absorptionspectroscopy, molar conductance in DMSO solution and magneticmoments (peffl.The result showed that the ligand (L) was coordinated to Mn+2, Ni+2,Ct+2,2n+2,Cd+2, and Hg+2 ions through the nitrogen atoms and sulpheratoms.From the result obtained, rhe following general formula [MLCl2] hasbeen given for the prepared complexes with an octahedral geometryaround the metal ions for all complexes.where M= Mn+2, Ni+2, cu+2, zn+2, cd+2, and Hg+2 l= l-phenyl-3-(2-(5-(phenyl amino

... Show More
Publication Date
Tue Jul 20 2021
Journal Name
Materials Science Forum
Red Laser Irradiation Effect on the Structural Properties of MawsoniteCu<sub>6</sub>Fe<sub>2</sub>SnS<sub>8</sub> [CFTS] Thin Films Deposited via Semi-Computerized Spray Pyrolysis Technique
...Show More Authors

The existing investigation explains the consequence of irradiation of violet laser on the structure properties of MawsoniteCu6Fe2SnS8 [CFTS] thin films. The film was equipped by the utilization of semi-computerized spray pyrolysis technique (SCSPT), it is the first time that this technique is used in the preparation and irradiation using a laser. when the received films were processed by continuous red laser (700 nm) with power (>1000mW) for different laser irradiation time using different number of times a laser scan (0, 6, 9, 12, 15 and 18 times) with total irradiation time (0,30,45,60,75,90 min) respectively at room temperature.. The XRD diffraction gave polycrysta

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 01 2021
Journal Name
World Heart Journal
Change in Left Ventricular Size and Ejection Fraction in Patients at Rest vs. Stress with Different Degrees of Ischemic Heart Failure
...Show More Authors

Background and Aim. Coronary artery disease (CAD) is a major risk factor for the progression to heart failure (HF), which is associated with an increase in left ventricular volume (LVV). This study aims to measure ventricular function and myocardial perfusion imaging markers of the left side of the heart, which can be performed with injection of a 99mTc at stress and rest by using single-photonemission-computed-tomography (SPECT). Subject and methods. The study included 121 patients with CAD, comprising 53 females and 68 males with ages between 25 to 88 years and 265 healthy subjects comprising 84 males and 181 females. All patients and healthy subjects volunteered to participate in this study. They were classified according to

... Show More
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
2-Quasi-prime modules
...Show More Authors

     We introduce in this paper, the notion of a 2-quasì-prime module as a generalization of quasi-prime module, we know that a module E over a ring R is called quasi-prime module, if (0) is quasi-prime submodule. Now, we say that a module E over ring R is a 2-quasi-prime module if (0) is 2-quasi-prime submodule, a proper submodule K of E is 2-quasi-prime submodule if whenever ,  and , then either  or .

Many results about these kinds of modules are obtained and proved, also, we will give a characterization of these kinds of modules.

View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Mar 14 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On 2-Absorbing Submodules
...Show More Authors

 Let R be a commutative ring with 10 and M is a unitary R-module . In this paper , our aim is to continue studying 2-absorbing submodules which are introduced by  A.Y. Darani and F. Soheilina . Many new properties and characterizations are given .

View Publication Preview PDF
Publication Date
Tue Mar 14 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
2-Regular Modules II
...Show More Authors

An R-module M is called a 2-regular module if every submodule N of M is 2-pure submodule, where a submodule N of M is 2-pure in M if for every ideal I of R, I2MN = I2N, [1]. This paper is a continuation of [1]. We give some conditions to characterize this class of modules, also many relationships with other related concepts are introduced.

View Publication Preview PDF
Publication Date
Wed Oct 28 2020
Journal Name
Iraqi Journal Of Science
Epileptic Seizures Detection Using DCT-II and KNN Classifier in Long-Term EEG Signals
...Show More Authors

     Epilepsy is one of the most common diseases of the nervous system around the world, affecting all age groups and causing seizures leading to loss of control for a period of time. This study presents a seizure detection algorithm that uses Discrete Cosine Transformation (DCT) type II to transform the signal into frequency-domain and extracts energy features from 16 sub-bands. Also, an automatic channel selection method is proposed to select the best subset among 23 channels based on the maximum variance. Data are segmented into frames of  one Second length without overlapping between successive frames. K-Nearest Neighbour (KNN) model is used to detect those frames either to ictal (seizure) or interictal (non-

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 02 2021
Journal Name
Iraqi Journal Of Science
An Approach Based on Decision Tree and Self-Organizing Map For Intrusion Detection
...Show More Authors

In modern years, internet and computers were used by many nations all overhead the world in different domains. So the number of Intruders is growing day-by-day posing a critical problem in recognizing among normal and abnormal manner of users in the network. Researchers have discussed the security concerns from different perspectives. Network Intrusion detection system which essentially analyzes, predicts the network traffic and the actions of users, then these behaviors will be examined either anomaly or normal manner. This paper suggested Deep analyzing system of NIDS to construct network intrusion detection system and detecting the type of intrusions in traditional network. The performance of the proposed system was evaluated by using

... Show More
View Publication Preview PDF