The study consisted in the development and use of a practical method to detect and
monitor, analyze and produce maps of changes in land use and land cover in the district of
Mahmudiya in Baghdad during the period 1990-2007 using the applications of remote sensing
techniques and with the assisstant of geographic information systems (GIS),as a valuable
contribution to land degradation studies.
This study is based maiuly on the processing on two subsets of landsat5 TM images picked up
in August 1990 and 2007 respectively in order to facilitate comparision and were thengeometrically and radiometrcally calibrated ,to used for digital classification purposes using
maximum liklihoods classification or six spectral bands of both images as input (with the
thermal bands being excluded)for procedures of change detection proposed, as well as the use
of installation chromatograpiy analysis and visual interpretation using spectral bands (2,4,7)
and (2,3,4) respectively for the preparation of a maps foe the patterns of land cover and land
uses in the study area.
Change detection results showed an increase in the area of class urban areas, in the year
1990, the area of this product 9.8 km 2, and in the year 2007 has become a 60.9 km 2 area of
the image, and an increase in the area of class agricultural land unexploited In 1990, the area
of this product 1290.50 km 2, and the year 2007 has become a 1610.33 km2 of the image, and
increase the area of classified land saline, in the year 1990, the area of this product 183.27 km
2, and in the year 2007 has become a 328.31 km2 of the image as well as an increase in the
area of class cover the water, in the year 1990 was space This product was 46.2 km 2, and in
the year 2007 has become a 62.5 km 2 of the area of the image, on the other hand decreased
space class vegetation In 1990, the area of this product 1140 km 2, and in the year 2007 has
become a 575.31 km 2, and also a decrease in class of arid lands In the year 1990, the area of
this product 407.12 km 2, and in the year 2007 has become a 261.95 km 2 area of the image.
The results revealed the reasous of land degradation in the district of Mahmudiya It
showed that the reason for an increase in the cover of water is an increase in human
activities,including the increase in artificial lakes, fish, this is important reason of land
degradation to decrease in a agriculture area, and this led decline to increased salinization of
the soil, either decrease in the arid land was due to the increase of urban land at the expense of
the land reclamation has happened in these arid lands
Keywords : land degradation , Remote Sensing , land covor , land use.
In this paper, several types of space-time fractional partial differential equations has been solved by using most of special double linear integral transform â€double Sumudu â€. Also, we are going to argue the truth of these solutions by another analytically method “invariant subspace methodâ€. All results are illustrative numerically and graphically.
This research discussed, the process of comparison between the regression model of partial least squares and tree regression, where these models included two types of statistical methods represented by the first type "parameter statistics" of the partial least squares, which is adopted when the number of variables is greater than the number of observations and also when the number of observations larger than the number of variables, the second type is the "nonparametric statistic" represented by tree regression, which is the division of data in a hierarchical way. The regression models for the two models were estimated, and then the comparison between them, where the comparison between these methods was according to a Mean Square
... Show MoreThe preparation of some new coordination compounds for nikel (II), manganese (II), copper (II), cobalt (II)and mercury (II), with ligand obtained from Benzoinand2-amino pyridine.The ligand[6-(2-hydroxy-1,2-diphenylethylideneamino)pyridin-3-ylium)](L) was made from reactin ethanol with metal salts in (1:1)(metal : ligand)ratio.[MLCl] was the inclusive formula of the complexes where M= Mn(II),Co(II),Ni(II),Cu(II) and Hg(II). Metal analysis by electronic spectra, atomic absorption ,infrared spectra, 1H&13C-NMR(only ligand)spectral studies, magnetic moment and molar conductance measurements used to describe the compounds.The determinations indicated that the ligand coordinates with the metal (II) ion in neutral tridentate manner th
... Show MoreRecently Tobit Quantile Regression(TQR) has emerged as an important tool in statistical analysis . in order to improve the parameter estimation in (TQR) we proposed Bayesian hierarchical model with double adaptive elastic net technique and Bayesian hierarchical model with adaptive ridge regression technique .
in double adaptive elastic net technique we assume different penalization parameters for penalization different regression coefficients in both parameters λ1and λ2 , also in adaptive ridge regression technique we assume different penalization parameters for penalization different regression coefficients i
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreObjective of this work is the mixing between human biometric characteristics and unique attributes of the computer in order to protect computer networks and resources environments through the development of authentication and authorization techniques. In human biometric side has been studying the best methods and algorithms used, and the conclusion is that the fingerprint is the best, but it has some flaws. Fingerprint algorithm has been improved so that their performance can be adapted to enhance the clarity of the edge of the gully structures of pictures fingerprint, taking into account the evaluation of the direction of the nearby edges and repeat. In the side of the computer features, computer and its components like human have uniqu
... Show MoreThis paper proposed a new method for network self-fault management (NSFM) based on two technologies: intelligent agent to automate fault management tasks, and Windows Management Instrumentations (WMI) to identify the fault faster when resources are independent (different type of devices). The proposed network self-fault management reduced the load of network traffic by reducing the request and response between the server and client, which achieves less downtime for each node in state of fault occurring in the client. The performance of the proposed system is measured by three measures: efficiency, availability, and reliability. A high efficiency average is obtained depending on the faults occurred in the system which reaches to
... Show MoreCrime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o