Preferred Language
Articles
/
jpd-383
Relationship of LST, NDVI, and NDBI using Landsat-8 data in Duhok city in 2019-2022
...Show More Authors

One of the most significant elements influencing weather, climate, and the environment is vegetation cover. Normalized Difference Vegetation Index (NDVI) and Normalized Difference Built-up Index (NDBI) over the years 2019–2022 were estimated based on four Landsat 8 TIRS’s images covering Duhok City. Using the radiative transfer model, the city's land surface temperature (LST) during the next four years was calculated. The aim of this study is to compute the temperature at the land's surface (LST) from the years 2019-2022 and understand the link, between LST, NDVI, and NDBI and the capability for mapping by LANDSAT-8 TIRS's. The findings revealed that the NDBI and the NDVI had the strongest correlation with the value R 2 = 82 in the year 2022. In comparison to the Normalized Difference vegetation index(NDVI), there was a relatively larger correlation between the NDBI and the surface temperature. However, the Normalized Difference Building up Index (NDBI) and temperature were determined to have the smallest correlation.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Sun Mar 01 2015
Journal Name
Journal Of Engineering
Multi-Sites Multi-Variables Forecasting Model for Hydrological Data using Genetic Algorithm Modeling
...Show More Authors

A two time step stochastic multi-variables multi-sites hydrological data forecasting model was developed and verified using a case study. The philosophy of this model is to use the cross-variables correlations, cross-sites correlations and the two steps time lag correlations simultaneously, for estimating the parameters of the model which then are modified using the mutation process of the genetic algorithm optimization model. The objective function that to be minimized is the Akiake test value. The case study is of four variables and three sites. The variables are the monthly air temperature, humidity, precipitation, and evaporation; the sites are Sulaimania, Chwarta, and Penjwin, which are located north Iraq. The model performance was

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Geological Journal
Evaluating Machine Learning Techniques for Carbonate Formation Permeability Prediction Using Well Log Data
...Show More Authors

Machine learning has a significant advantage for many difficulties in the oil and gas industry, especially when it comes to resolving complex challenges in reservoir characterization. Permeability is one of the most difficult petrophysical parameters to predict using conventional logging techniques. Clarifications of the work flow methodology are presented alongside comprehensive models in this study. The purpose of this study is to provide a more robust technique for predicting permeability; previous studies on the Bazirgan field have attempted to do so, but their estimates have been vague, and the methods they give are obsolete and do not make any concessions to the real or rigid in order to solve the permeability computation. To

... Show More
View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Wed Mar 23 2022
Journal Name
Journal Of Educational And Psychological Researches
The professional self and its relationship with the school climate among educational counselors in secondary schools.
...Show More Authors

The research aims to reveal the professional self and the school climate among the educational counselors. The research problem is crystallized in the following:

1-Identifying the professional level of the educational counselors.

2- Knowing the level of the school climate with the educational counselors.

3- Are there statistically significant differences in the professional self and the school climate between the educational counselors of different gender (male / female)?

4- Is there a relationship between the professional self and the school climate of the research sample?

To answer these questions, the research was conducted on educational counselors in secondary schools in the district of Falluj

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 02 2020
Journal Name
Arab Science Heritage Journal
الظاهرة اللغوية بين الوص ف والتفسير أث ر المفاهي م الكل ي ة في التوفيق بين الاتجاهين العقلاني والطبيعي في دراس ة اللغ ة البشرية
...Show More Authors

This research investigates modern linguistics in terms of the “universality” concept, through which linguistics shifted its attention from the description of the phenomenon into finding an interpretation of it. Then it investigates what needs interpretation in the language

View Publication Preview PDF
Publication Date
Thu Jan 02 2020
Journal Name
Arab Science Heritage Journal
الظاهرة اللغوية بين الوص ف والتفسير أث ر المفاهي م الكل ي ة في التوفيق بين الاتجاهين العقلاني والطبيعي في دراس ة اللغ ة البشرية
...Show More Authors

This research investigates modern linguistics in terms of the “universality” concept, through which linguistics shifted its attention from the description of the phenomenon into finding an interpretation of it. Then it investigates what needs interpretation in the language

View Publication Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Fuzzy-assignment Model by Using Linguistic Variables
...Show More Authors

      This work addressed the assignment problem (AP) based on fuzzy costs, where the objective, in this study, is to minimize the cost. A triangular, or trapezoidal, fuzzy numbers were assigned for each fuzzy cost. In addition, the assignment models were applied on linguistic variables which were initially converted to quantitative fuzzy data by using the Yager’sorankingi method. The paper results have showed that the quantitative date have a considerable effect when considered in fuzzy-mathematic models.

View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat May 10 2025
Journal Name
سفير برس
استشراق مؤسسات المعلومات في عام 2050
...Show More Authors

يتناول هذا المقال تصورًا مستقبليًا لمؤسسات المعلومات في عام 2050، حيث يستعرض كيف ستتغير بنيتها لتصبح ذكية ومستدامة، ويستعرض دور أخصائي المعلومات في بيئة رقمية متقدمة. كما يناقش تطور مصادر المعلومات وخدماتها، ونُظم تنظيمها، بالإضافة إلى تنوع المستفيدين، مع إبراز دور هذه المؤسسات في دعم التنمية المستدامة

View Publication Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref