Developing a new adaptive satellite images classification technique, based on a new way of merging between regression line of best fit and new empirical conditions methods. They are supervised methods to recognize different land cover types on Al habbinya region. These methods should be stand on physical ground that represents the reflection of land surface features. The first method has separated the arid lands and plants. Empirical thresholds of different TM combination bands; TM3, TM4, and TM5 were studied in the second method, to detect and separate water regions (shallow, bottomless, and very bottomless). The Optimum Index Factor (OIF) is computed for these combination bands, which realized the higher OIF value with low correlated from other TM combination bands. This study was performed using ArcGIS9.3, ENVI 4.5 softwares and MATLAB7.9b language.
This paper presents a new RGB image encryption scheme using multi chaotic maps. Encrypting an image is performed via chaotic maps to confirm the properties of secure cipher namely confusion and diffusion are satisfied. Also, the key sequence for encrypting an image is generated using a combination of 1D logistic and Sine chaotic maps. Experimental results and the compassion results indicate that the suggested scheme provides high security against several types of attack, large secret keyspace and highly sensitive.
This study has been accomplished by testing three different models to determine rocks type, pore throat radius, and flow units for Mishrif Formation in West Qurna oilfield in Southern Iraq based on Mishrif full diameter cores from 20 wells. The three models that were used in this study were Lucia rocks type classification, Winland plot was utilized to determine the pore throat radius depending on the mercury injection test (r35), and (FZI) concepts to identify flow units which enabled us to recognize the differences between Mishrif units in these three categories. The study of pore characteristics is very significant in reservoir evaluation. It controls the storage mechanism and reservoir fluid prope
In recent years, encryption technology has been developed rapidly and many image encryption methods have been put forward. The chaos-based image encryption technique is a modern encryption system for images. To encrypt images, it uses random sequence chaos, which is an efficient way to solve the intractable problem of simple and highly protected image encryption. There are, however, some shortcomings in the technique of chaos-based image encryption, such limited accuracy issue. The approach focused on the chaotic system in this paper is to construct a dynamic IP permutation and S-Box substitution by following steps. First of all, use of a new IP table for more diffusion of al
... Show MoreThe present study is an attempt to throw light on the nature of the US policy regarding the Middle East region as portrayed by AI-Sabah, Al-Mashriq and Tariq Al-Shaab papers over a period of three months from 1st of July to 30th of September 2013.
In writing this study, a number of goals have been set by the researcher. These goals may include but in no way limited to the nature of the US image as carried by the above three papers, the nature of the topics tackled by them and the nature of the Arab countries which received more and extensive coverage than others.
A qualitative research approach is proposed for the study. This approach has allowed the researcher to arrive at definite answers for the possible questions rais
... Show MoreThis work deals with the reporting of four helminthes in the rook partridge Alectoris graeca collected in G'ara area west of Iraq. The infection rates of the cestodes, Raillietina alectori and R. tetragona and the nematode. Hartertia gallinarum, and the trematode. Postharmostomum gallinum were 6.38%, 40.43%, 10.63%, and 10.63% respectively. The host relationships were discussed.
The major objective of this paper is to recognize the flow units of Yamama Formation in the west Qurna oil field, south of Iraq. To attain this objective, four wells namely, WQ-23, WQ-148, WQ-60, and WQ-203 are selected and analyzed. The two techniques hat proposed by some scientists to identify flow units are tested and verified. Results are also enhanced using well logs interpretation and the flow areas are proposed through the studying of the behavior of different well logs. Results of applying the two proposed techniques identify six flow reservoir units for the wells WQ-23, WQ-148, WQ-60, and WQ-203, respectively. This study also shows that the flow reservoir properties in the Yamama Formation improved towards the northeast of the W
... Show MoreThe meteorite with a single total mass of 630 gm as a visible meteorite has fallen on 22 March 2021, at 10:00 a.m. in Al-Sherqat subdistrict within Salah Al-Din, northern Iraq; and therefore, was named Al-Sherqat meteorite by the authors. It is characterized by a uniform structure of coherent and medium degree of malleability. It is of a well-crystalline structure and not homogeneous in composition. The Al-Sherqat meteorite is composed of metallic phases of 7.6 gm/cm3 density exhibiting an oriented intergrowth of kamacite (α-FeNi) with taenite showing a Widmanstätten pattern on an etched polished section with the finest octahedrite kamacite bandwidth of less than 0.2 mm. It is composed of Fe (86.9 wt%), Ni (9.63 wt%), P (1.31 wt%)
... Show MoreText based-image clustering (TBIC) is an insufficient approach for clustering related web images. It is a challenging task to abstract the visual features of images with the support of textual information in a database. In content-based image clustering (CBIC), image data are clustered on the foundation of specific features like texture, colors, boundaries, shapes. In this paper, an effective CBIC) technique is presented, which uses texture and statistical features of the images. The statistical features or moments of colors (mean, skewness, standard deviation, kurtosis, and variance) are extracted from the images. These features are collected in a one dimension array, and then genetic algorithm (GA) is applied for image clustering.
... Show MoreIn this paper, we designed a new efficient stream cipher cryptosystem that depend on a chaotic map to encrypt (decrypt) different types of digital images. The designed encryption system passed all basic efficiency criteria (like Randomness, MSE, PSNR, Histogram Analysis, and Key Space) that were applied to the key extracted from the random generator as well as to the digital images after completing the encryption process.