A band rationing method is applied to calculate the salinity index (SI) and Normalized Multi-Band Drought Index (NMDI) as pre-processing to take Agriculture decision in these areas is presented. To separate the land from other features that exist in the scene, the classical classification method (Maximum likelihood classification) is used by classified the study area to multi classes (Healthy vegetation (HV), Grasslands (GL), Water (W), Urban (U), Bare Soil (BS)). A Landsat 8 satellite image of an area in the south of Iraq are used, where the land cover is classified according to indicator ranges for each (SI) and (NMDI).
In this work, measurements of activity concentration of naturally occurring radioactive materials (NORM) isotopes and their related hazard indices for several materials such as crude oil, sludge and water in Ahdeb oil fields in Waste governorate using high pure germanium coaxial detection technique. The average values for crude oil samples were174.72Bq/l, 43.46Bq/l, 355.07Bq/l, 264.21Bq/l, 122.52nGy/h, 0.7138, 1.1861, 0.601 mSv/y, 0.1503mSv/y and 1.8361 for Ra-226, Ac-228, K-40, Ra eq, D, H-external and H-internal respectively. According to the results; the ratio between 238U to 232Th was 4, which represents the natural ratio in the crust earth; therefore, one can be strongly suggested that the geo-stricture of the
... Show MoreThe chemical properties of chemical compounds and their molecular structures are intimately connected. Topological indices are numerical values associated with chemical molecular graphs that help in understanding the physicochemical properties, chemical reactivity and biological activity of a chemical compound. This study obtains some topological properties of second and third dominating David derived (DDD) networks and computes several K Banhatti polynomial of second and third type of DDD.
The corrosion of low carbon steel boiler tubes in demi water had been investigated. The purpose of this investigation was to determine the change produced in corrosion behavior of the carbon steel as a result of the specific presence of chloride and copper ions in the water under different temperatures. For low carbon steel experiments, the temperature was taken in three levels (125, 175, and 215°C) under about 27 bar pressure and 1500 rpm in autoclave. Using weight loss technique, the corrosion rate ranges from (85 to 789 gmd) for low carbon steel boiler tubes.
This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show Morenumerical study is applied to the mercury-argon mixture by solving the boltzman transport equation for different mixture percentage.
In the present work, Uranium (238U), Thorium (232Th) and Potassium (40K) specific activity concentration in (Bq/kg) was measured in five different types for wheat flours that are available in the Iraqi markets. The gamma spectrometry method with an NaI (Tl) detector has been used for radiometric measurements. Calculations of radium equivalent activity, annual effective dose equivalent, external hazard index (Hex), internal hazard index (Hin), representing gamma index and gamma dose rate in all flour samples were 17.98132 Bq/kg, 0.0100334, 0.04502, 0.04857, 0.06872, 0.125883 and 8.181244 respectively. It is found that the average of specific activity concentration of wheat flour sam
... Show MoreSecured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.