A band rationing method is applied to calculate the salinity index (SI) and Normalized Multi-Band Drought Index (NMDI) as pre-processing to take Agriculture decision in these areas is presented. To separate the land from other features that exist in the scene, the classical classification method (Maximum likelihood classification) is used by classified the study area to multi classes (Healthy vegetation (HV), Grasslands (GL), Water (W), Urban (U), Bare Soil (BS)). A Landsat 8 satellite image of an area in the south of Iraq are used, where the land cover is classified according to indicator ranges for each (SI) and (NMDI).
The study aimed to reach the best rating for the views and variables in the totals characterized by qualities and characteristics common within each group and distinguish them from aggregates other for the purpose of distinguishing between Iraqi provinces which suffer from deprivation, for the purpose of identifying the status of those provinces in the early allowing interested parties and regulators to intervene to take appropriate corrective action in a timely manner. Style has been used cluster analysis Cluster analysis to reach the best rating to those totals from the provinces that suffer from problems, where the provinces were classified, based on the variables (Edu
... Show MoreSoil that has been contaminated by heavy metals is a serious environmental problem. A different approach for forecasting a variety of soil physical parameters is reflected spectroscopy is a low-cost, quick, and repeatable analytical method. The objectives of this paper are to predict heavy metal (Ti, Cr, Sr, Fe, Zn, Cu and Pb) soil contamination in central and southern Iraq using spectroscopy data. An XRF was used to quantify the levels of heavy metals in a total of 53 soil samples from Baghdad and ThiQar, and a spectrogram was used to examine how well spectral data might predict the presence of heavy metals metals. The partial least squares regression PLSR models performed well in pr
Preserving the independence and sovereignty of the countries of the South Caucasus region, establishing political and economic stability in the region, and supporting regional cooperation are the main elements of Turkish foreign policy towards the region. The South Caucasus region, which has historical and cultural ties between it and Turkey, is a bridge that links Turkey to Central Asia.
Turkey later developed advanced relations with Azerbaijan and Georgia. However, the same momentum was not achieved in terms of relations with Armenia because of the conflict over Nagorny Karabakh
... Show MoreIn this study, the response and behavior of machine foundations resting on dry and saturated sand was investigated experimentally. A physical model was manufactured to simulate steady state harmonic load at different operating frequencies. The effect of relative density, depth of embedment, foundation area as well as the imposed harmonic load was investigated. It was found that the amplitude of displacement of the foundation increases with increasing the amplitude of dynamic force and operating frequency meanwhile it decreases with increasing the relative density of sand, degree of saturation, depth of embedment and contact area of footing. The maximum displacement was noticed at 33.34 to 41.67 Hz. The maximum displacement amplitude respons
... Show MoreIn this study, the response and behavior of machine foundations resting on dry and saturated sand was investigated experimentally. A physical model was manufactured to simulate steady state harmonic load at different operating frequencies. The effect of relative density, depth of embedment, foundation area as well as the imposed harmonic load was investigated. It was found that the amplitude of displacement of the foundation increases with increasing the amplitude of dynamic force and operating frequency meanwhile it decreases with increasing the relative density of sand, degree of saturation, depth of embedment and contact area of footing. The maximum displacement was noticed at 33.34 to 41.67 Hz. The maximum displaceme
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreLongitudinal data is becoming increasingly common, especially in the medical and economic fields, and various methods have been analyzed and developed to analyze this type of data.
In this research, the focus was on compiling and analyzing this data, as cluster analysis plays an important role in identifying and grouping co-expressed subfiles over time and employing them on the nonparametric smoothing cubic B-spline model, which is characterized by providing continuous first and second derivatives, resulting in a smoother curve with fewer abrupt changes in slope. It is also more flexible and can pick up on more complex patterns and fluctuations in the data.
The longitudinal balanced data profile was compiled into subgroup
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreA two time step stochastic multi-variables multi-sites hydrological data forecasting model was developed and verified using a case study. The philosophy of this model is to use the cross-variables correlations, cross-sites correlations and the two steps time lag correlations simultaneously, for estimating the parameters of the model which then are modified using the mutation process of the genetic algorithm optimization model. The objective function that to be minimized is the Akiake test value. The case study is of four variables and three sites. The variables are the monthly air temperature, humidity, precipitation, and evaporation; the sites are Sulaimania, Chwarta, and Penjwin, which are located north Iraq. The model performance was
... Show More