74 fanners were randomily selected from the Lc:ital. of 406 fanners using the Modern Irrigation System up to November , 2000 , for the purpose of wide adoptation of such system. Rcsults indicated according to the data which has been obtained and statistically analysed by the statistical package for the Social Sciences (SPSS) program showed that the majority of the farmers adopted this new system of irrigation due to the increase in the yield up to 5" .
In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreThis paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreIT has its impact on all aspects of life, including its planning and operations. Based on the assumption that the plan can adapt any technique as an analytical tool within broader dimensions to include society in general and meet the requirements of that society. They have neutral values, meaning and usefulness rather than being adopted as abstract goals or objectives so that the planner or the decision-maker can benefit greatly from them. This information technology is summarized in three main axes: First: Geographic Information Systems. Second: computer modeling. Third: visual simulation and the Internet. The problem of research is that the decision-making environment of the plan is surrounded by uncertain information-planning conditio
... Show MoreAssessing the accuracy of classification algorithms is paramount as it provides insights into reliability and effectiveness in solving real-world problems. Accuracy examination is essential in any remote sensing-based classification practice, given that classification maps consistently include misclassified pixels and classification misconceptions. In this study, two imaginary satellites for Duhok province, Iraq, were captured at regular intervals, and the photos were analyzed using spatial analysis tools to provide supervised classifications. Some processes were conducted to enhance the categorization, like smoothing. The classification results indicate that Duhok province is divided into four classes: vegetation cover, buildings,
... Show MoreBackground: coronavirus 19 is a beta-coronavirus, enveloped and roughly spherical with approximately 60 to 140 nm in diameter with positive-sense single-stranded RNA genome.
Objectives: Measurement of interleukin 6 (IL6) level in a group of patients with confirmed Covid19 infection and its correlation with many hematological and biochemical parameters , mainly lymphocyte , neutrophil count and their ratio , platelet count , serum ferritin , C reactive protein as well as D-dimer level
Subjects and Methods: This study was conducted on 60 PCR positive patients variably affected by COVID-19 , cases collected sequentially from June till November 20
... Show MoreIdentification of pathogens and locating their inocul¬um source (S) are the first strategies toward successful disease management program the pretransplating seedl¬ing damping - off problem on vegetable crops was found to be caused by Pythium aphanidermatum and Rhizocto¬nia solani. Both fungi were isolated from peat (moss) for the first time in Iraq. In addition, considerable num¬ber of pathogenic fungi was found as contaminants in soil samples from Alrashidiah vegetable covered farming station. Among the isolated fungi were: Pythium apha¬nidermatum, Rhizoctonia solani, Sclerotinia sclerotiorum, Fusarium oxysporum, Fusarium solani phialophora spp., Cephalisporium spp Rizopus stolonfier and Botrytis cine¬rea, in addition to several
... Show MoreThe study aimed to assess the expression of CD49d and CD26 in newly diagnosed CLL patients and find their correlation with clinical Binet stage, and other clinical parameters. This study was conducted on 51 newly diagnosed CLL patients based on lymphocyte count > 5×109/L and immunophenotyping. The expression of CD49d, and CD26 were investigated using eight-color flow cytometer. The expression of CD49d and CD26 were detected in 56.9 %, 68.8 % of CLL patients, respectively. The correlation between CD49d expression and CD26 expression was statistically significant (p < 0.001) with high concordance rate between them. The positive expression of both CD49d and CD26 had statistically significant association with clinical Binet staging (p < 0.001,
... Show More