The land cover of Mahmudiyah city, located south of the capital, Baghdad - Iraq, was studied for the period from 1986 to 2021 with five years between every two successive scenes, where Landsat scenes were used downloaded from the US Geological Survey (USGS ) website with low cloud cover for sensors TM and OLI. The land cover of the study area was classified. The total accuracy of the classification was calculated, as well as the analysis of the user accuracy and the classifier accuracy (maximum likelihood) and its impact on the overall classification accuracy. The lowest accuracy value in 2009 was (85.101% (and the highest accuracy value in 1995) was 95.654%). The constancy percentage of the class for the adopted years was calculated and
... Show MoreIn light of this, attention should be paid to tax reform as part of a comprehensive economic reform program. Therefore, the research started from the problem of the weak efficiency of the tax reform process in the General Authority for Taxation, as well as the need to know the addition of new taxes or increase taxes.The research aims study the relative importance of each disabled person, whether organizational, human, financial, legislative or technical. The research led to a number of conclusions, the most important of which were that the financial obstacles occupy the highest importance of the other obstacles and for the success of the tax reform, the material resources must be provided in order to provide the n
... Show MoreThree-dimensional cavity was investigated numerical in the current study filled with porous medium from a saturated fluid. The problem configuration consists of two insulated bottom and right wall and left vertical wall maintained at constant temperatures at variable locations, using two discretized heaters. The porous cavity fluid motion was represented by the momentum equation generalized model. The present investigation thermophysical parameters included the local thermal equilibrium condition. The isotherms and streamlines was used to examine energy transport and momentum. The meaning of changing parameters on the established average Nusselt number, temperature and velocity distribution are highlighted and discussed.
This study includes the manufacture of four ternary alloys represented S60Se40-XPbX with weight ratios x = 0, 10, 20, and 30 by the melting point method. The components of each alloy were mixed separately, then placed in quartz ampoules and vacuumed out with a vacuum of roger that 10−4 Torr. The ampule was heated in two stages to avoid sudden dissipation and precipitation of selenium on the inner mass of the quartz tube. The ampoule was gradually heated and kept at 450°C for approximately 4 hours followed by 950°C for 10 hours.at a rate of 10 degrees Celsius, the temperature of the electric furnace
JPEG is most popular image compression and encoding, this technique is widely used in many applications (images, videos and 3D animations). Meanwhile, researchers are very interested to develop this massive technique to compress images at higher compression ratios with keeping image quality as much as possible. For this reason in this paper we introduce a developed JPEG based on fast DCT and removed most of zeros and keeps their positions in a transformed block. Additionally, arithmetic coding applied rather than Huffman coding. The results showed up, the proposed developed JPEG algorithm has better image quality than traditional JPEG techniques.
With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show MoreWith the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show MoreBasically, this study aims to identify the extent to which Iraqi secondary school students use writing strategies and how proficiency level and students gender could affect writing strategy use. The study also examines the relationship between writing achievement and writing strategy use among Iraqi secondary school students. For this purpose, 140 Iraqi secondary school students were selected randomly from six different schools. Petric and Czarl’s questionnaire (2003) was adopted in the study as an instrument to collect the needed data. A software of SPSS used to analyze the collected data. The findings revealed that secondary school students appeared as low users of writing strategies; low proficient students do not show a sta
... Show More