Urban land price is the primary indicator of land development in urban areas. Land prices in holly cities have rapidly increased due to tourism and religious activities. Public agencies are usually facing challenges in managing land prices in religious areas. Therefore, they require developed models or tools to understand land prices within religious cities. Predicting land prices can efficiently retain future management and develop urban lands within religious cities. This study proposed a new methodology to predict urban land prices within holy cities. The methodology is based on two models, Linear Regression (LR) and Support Vector Regression (SVR), and nine variables (land price, land area, distance to a river, distance to main roads, distance to heritage locations, distance to historical mosques, distance to commercial locations, distance to educational locations, and distance to hospital and clinics. Our findings showed that the SVR model had outperformed the LR model, where SVR achieved an accuracy of 82.9%.In contrast, LR has achieved 75.40%. Therefore, the presented models can assess land prices in holly cities like Al-Kufa. Furthermore, this tool can retain land pricing, land management, and urban planning in Iraq.
Texture synthesis using genetic algorithms is one way; proposed in the previous research, to synthesis texture in a fast and easy way. In genetic texture synthesis algorithms ,the chromosome consist of random blocks selected manually by the user .However ,this method of selection is highly dependent on the experience of user .Hence, wrong selection of blocks will greatly affect the synthesized texture result. In this paper a new method is suggested for selecting the blocks automatically without the participation of user .The results show that this method of selection eliminates some blending caused from the previous manual method of selection.
TThe property of 134−140Neodymium nuclei have been studied in framework Interacting Boson Model (IBM) and a new method called New Empirical Formula (NEF). The energy positive parity bands of 134−140Nd have been calculated using (IBM) and (NEF) while the negative parity bands of 134−140Nd have been calculated using (NEF) only. The E-GOS curve as a function of the spin (I) has been drawn to determine the property of the positive parity yrast band. The parameters of the best fit to the measured data are determined. The reduced transition probabilities of these nuclei was calculated. The critical point has been determined for 140Nd isotope. The potential energy surfaces (PESs) to the IBM Hamiltonian have been obtained using the intrin
... Show MoreThe primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show MoreOne of the troublesome duties in chemical industrial units is determining the instantaneous drop size distribution, which is created between two immiscible liquids within such units. In this work a complete system for measuring instantaneous droplet size is constructed. It consists of laser detection system (1mW He-Ne laser), drop generation system (turbine mixer unit), and microphotography system. Two immiscible liquids, water and kerosene were mixed together with different low volume fractions (0.0025, 0.02) of kerosene (as a dispersed phase) in water (as a continuous phase). The experiments were carried out at different rotational speed (1180- 2090 r.p.m) of the turbine mixer. The Sauter mean diameter of the drops was determined by la
... Show MoreRumors are typically described as remarks whose true value is unknown. A rumor on social media has the potential to spread erroneous information to a large group of individuals. Those false facts will influence decision-making in a variety of societies. In online social media, where enormous amounts of information are simply distributed over a large network of sources with unverified authority, detecting rumors is critical. This research proposes that rumor detection be done using Natural Language Processing (NLP) tools as well as six distinct Machine Learning (ML) methods (Nave Bayes (NB), random forest (RF), K-nearest neighbor (KNN), Logistic Regression (LR), Stochastic Gradient Descent (SGD) and Decision Tree (
... Show MoreIn the current research work, a system of hiding a text in a digital grayscale image has been presented. The algorithm system that had been used was adopted two transforms Integer Wavelet transform and Discrete Cosine transformed. Huffman's code has been used to encoding the text before the embedding it in the cover image in the HL sub band. Peak Signal to Noise Ratio (PSNR) was used to measure the effect of embedding text in the watermarked image; also correlation coefficient has been used to measure the ratio of the recovered text after applying an attack on the watermarked image and we get a good result. The implementation of our proposed Algorithm is realized using MATLAB version 2010a.
Determination of the sites of geographical coordinates with high accuracy and in short time is very important in many applications, including: air and sea navigation, and in the uses geodetic surveys. Today, the Global Positioning System (GPS) plays an important role in performing this task. The datum used for GPS positioning is called World Geodetic System 1984 (WGS84). It consists of a three-dimensional Cartesian coordinate system and an associated ellipsoid so that WGS84 positions describe coordinates as latitude, longitude and ellipsoid height (h) coordinates, with respect to the center of mass of the Earth This study develops a mathematical model for geomantic measurement correction for ellipsoidal heights (h) between two different
... Show MoreRapid population growth and the development of industries result in an increase in solid waste. Glass, which represents a large proportion of solid waste, can be used in construction applications. The utilization of recycled glass waste in the asphalt mixture is considered an environmentally-friendly application. In this laboratory study, glass bottles were recycled by crushing, grinding, and sieving them into particles that pass through sieve No. 200 to be used as a partial replacement for the filler in the hot mixture asphalt of wearing course Type-A. The ratios (4, 4.3, 4.6, 4.9, 5.2,5.5) were used to determine the optimum asphalt content (OAC), and three ratios (30, 60, and 90) were used for the replacement of limestone powder filler to
... Show MoreVegetation monitoring is considered an important application in remote sensing task due to variation of vegetation types and their distribution. The vegetation concentration around the Earth is increase in 5% in 2000 according to NASA monitoring. This increase is due to the Indian vegetable programs. In this research, the vegetation monitoring in Baghdad city was done using Normalized Difference Vegetation Index (NDVI) for temporal Landsat satellite images (Landsat 5 TM& Landsat 8 OIL). These images had been used and utilize in different times during the period from 2000, 2010, 2015 & 2017. The outcomes of the study demonstrate that a change in the vegetation Cover (VC) in Baghdad city. (NDVI) generally shows a
... Show MoreIn every system of security, to keep important data confidential, we need a high degree of protection. Steganography can be defined as a way of sending confidential texts through a secure medium of communications as well as protecting the information during the process of transmission. Steganography is a technology that is used to protect users' security and privacy. Communication is majorly achieved using a network through SMS, e-mail, and so on. The presented work suggested a technology of text hiding for protecting secret texts with Unicode characters. The similarities of glyphs provided invisibility and increased the hiding capacity. In conclusion, the proposed method succeeded in securing confidential data and achieving high p
... Show More