Preferred Language
Articles
/
jcoeduw-1031
Use of Remote Sensing in the assessment and classification of land degradation in the district of Mahmudiya for the period 1990-2007
...Show More Authors

The study consisted in the development and use of a practical method to detect and
monitor, analyze and produce maps of changes in land use and land cover in the district of
Mahmudiya in Baghdad during the period 1990-2007 using the applications of remote sensing
techniques and with the assisstant of geographic information systems (GIS),as a valuable
contribution to land degradation studies.
This study is based maiuly on the processing on two subsets of landsat5 TM images picked up
in August 1990 and 2007 respectively in order to facilitate comparision and were thengeometrically and radiometrcally calibrated ,to used for digital classification purposes using
maximum liklihoods classification or six spectral bands of both images as input (with the
thermal bands being excluded)for procedures of change detection proposed, as well as the use
of installation chromatograpiy analysis and visual interpretation using spectral bands (2,4,7)
and (2,3,4) respectively for the preparation of a maps foe the patterns of land cover and land
uses in the study area.
Change detection results showed an increase in the area of class urban areas, in the year
1990, the area of this product 9.8 km 2, and in the year 2007 has become a 60.9 km 2 area of
the image, and an increase in the area of class agricultural land unexploited In 1990, the area
of this product 1290.50 km 2, and the year 2007 has become a 1610.33 km2 of the image, and
increase the area of classified land saline, in the year 1990, the area of this product 183.27 km
2, and in the year 2007 has become a 328.31 km2 of the image as well as an increase in the
area of class cover the water, in the year 1990 was space This product was 46.2 km 2, and in
the year 2007 has become a 62.5 km 2 of the area of the image, on the other hand decreased
space class vegetation In 1990, the area of this product 1140 km 2, and in the year 2007 has
become a 575.31 km 2, and also a decrease in class of arid lands In the year 1990, the area of
this product 407.12 km 2, and in the year 2007 has become a 261.95 km 2 area of the image.
The results revealed the reasous of land degradation in the district of Mahmudiya It
showed that the reason for an increase in the cover of water is an increase in human
activities,including the increase in artificial lakes, fish, this is important reason of land
degradation to decrease in a agriculture area, and this led decline to increased salinization of
the soil, either decrease in the arid land was due to the increase of urban land at the expense of
the land reclamation has happened in these arid lands
Keywords : land degradation , Remote Sensing , land covor , land use.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jul 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Solving Some Fractional Partial Differential Equations by Invariant Subspace and Double Sumudu Transform Methods
...Show More Authors

      In this paper, several types of space-time fractional partial differential equations has been solved by using most of special double linear integral transform ”double  Sumudu ”. Also, we are going to argue the truth of these solutions by another analytically method “invariant subspace method”. All results are illustrative numerically and graphically.

View Publication Preview PDF
Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Between Partial Least Square Regression(PLSR) and Tree Regression by Using Simulation(RT).
...Show More Authors

This research discussed, the process of comparison between the regression model of partial least squares and tree regression, where these models included two types of statistical methods represented by the first type "parameter statistics" of the partial least squares, which is adopted when the number of variables is greater than the number of observations and also when the number of observations larger than the number of variables, the second type is the "nonparametric statistic" represented by tree regression, which is the division of data in a hierarchical way. The regression models for the two models were estimated, and then the comparison between them, where the comparison between these methods was according to a Mean Square

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Metal (II) Complexes with Tridentate N, N,O Ligand: Synthesis, Characterization and Biological Studies 
...Show More Authors

 The preparation of some new coordination compounds for nikel (II), manganese (II), copper (II), cobalt (II)and mercury (II), with ligand obtained from Benzoinand2-amino pyridine.The ligand[6-(2-hydroxy-1,2-diphenylethylideneamino)pyridin-3-ylium)](L) was made from reactin ethanol with metal salts in (1:1)(metal : ligand)ratio.[MLCl] was the inclusive formula of the complexes where M= Mn(II),Co(II),Ni(II),Cu(II) and Hg(II). Metal analysis by electronic spectra, atomic absorption ,infrared spectra, 1H&13C-NMR(only ligand)spectral studies, magnetic moment and molar conductance measurements used to describe the compounds.The determinations indicated that the ligand coordinates with the metal (II) ion in neutral tridentate manner th

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Bayesian Tobit Quantile Regression Model Using Double Adaptive elastic net and Adaptive Ridge Regression
...Show More Authors

     Recently Tobit  Quantile Regression(TQR) has emerged as an important tool in statistical analysis . in order to improve the parameter estimation in (TQR) we proposed Bayesian hierarchical model with double adaptive elastic net technique  and Bayesian hierarchical model with adaptive ridge regression technique .

 in double adaptive elastic net technique we assume  different penalization parameters  for penalization different regression coefficients in both parameters λ1and  λ, also in adaptive ridge regression technique we assume different  penalization parameters for penalization different regression coefficients i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Engineering
A Real-Time Fuzzy Load Flow and Contingency Analysis Based on Gaussian Distribution System
...Show More Authors

Fuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed  method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Mon Feb 20 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Hybrid Algorithm to Protect Computer Networks Based on Human Biometrics and Computer Attributes
...Show More Authors

Objective of this work is the mixing between human biometric characteristics and unique attributes of the computer in order to protect computer networks and resources environments through the development of authentication and authorization techniques. In human biometric side has been studying the best methods and algorithms used, and the conclusion is that the fingerprint is the best, but it has some flaws. Fingerprint algorithm has been improved so that their performance can be adapted to enhance the clarity of the edge of the gully structures of pictures fingerprint, taking into account the evaluation of the direction of the nearby edges and repeat. In the side of the computer features, computer and its components like human have uniqu

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
Network Self-Fault Management Based on Multi-Intelligent Agents and Windows Management Instrumentation (WMI)
...Show More Authors

This paper proposed a new method for network self-fault management (NSFM) based on two technologies: intelligent agent to automate fault management tasks, and Windows Management Instrumentations (WMI) to identify the fault faster when resources are independent (different type of devices). The proposed network self-fault management reduced the load of network traffic by reducing the request and response between the server and client, which achieves less downtime for each node in state of fault occurring in the client. The performance of the proposed system is measured by three measures: efficiency, availability, and reliability. A high efficiency average is obtained depending on the faults occurred in the system which reaches to

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Intelligent Systems
A study on predicting crime rates through machine learning and data mining using text
...Show More Authors
Abstract<p>Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o</p> ... Show More
View Publication
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Minerva Dental And Oral Science
Salivary interleukin-1β as a biomarker to differentiate between periodontal health, gingivitis, and periodontitis
...Show More Authors

View Publication
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref