One of the most significant elements influencing weather, climate, and the environment is vegetation cover. Normalized Difference Vegetation Index (NDVI) and Normalized Difference Built-up Index (NDBI) over the years 2019–2022 were estimated based on four Landsat 8 TIRS’s images covering Duhok City. Using the radiative transfer model, the city's land surface temperature (LST) during the next four years was calculated. The aim of this study is to compute the temperature at the land's surface (LST) from the years 2019-2022 and understand the link, between LST, NDVI, and NDBI and the capability for mapping by LANDSAT-8 TIRS's. The findings revealed that the NDBI and the NDVI had the strongest correlation with the value R 2 = 82 in the year 2022. In comparison to the Normalized Difference vegetation index(NDVI), there was a relatively larger correlation between the NDBI and the surface temperature. However, the Normalized Difference Building up Index (NDBI) and temperature were determined to have the smallest correlation.
Abstract
The present study aims to assess the knowledge, attitude, and experience of off-label prescribing practice among physicians in Baghdad city hospitals. This cross-sectional study was performed through the period from November 1st 2018 to March 2019 at 17 hospitals, a self-administered questionnaire was utilized to collect data from the physicians, and the targeted hospitals were randomly selected at different regions in Baghdad City area. Out of the 400 distributed questionnaires to the physicians, 383 of them were returned completed, 57.2% indicated that they were reasonably familiar with the term “off label drug”, 57.7% mentioned that the most common medical reasons for the prescribing o
... Show MoreThe research has conducted on shelterbelt of Al-Ashraf Najaf city to explore suitability of four Eucalyptus camaldulensis Dehnh. Forms and two other tree species; Casuarina equisetifolia and Olea europaea to the local dominant sever conditions. Development in growth was studied through the interval of five years. Growth parameters included height, DBH stem diameter, main stem height, crown diameter, and stem girth were investigated. Distance from water supply was inspected, too. Results showed superiority of E. camaldulensis upon other species. Investigations showed weakness in growth of C. equisetifolia where most of trees could not resist because of their position in oppos
... Show MoreTeen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC
... Show Moreالحمد لله الذي أمر عباده بكل خير واجب أو مندوب ، ووعدهم بالثواب على قليله وكثيره بقوله (فَمَنْ يَعْمَلْ مِثْقَالَ ذَرَّةٍ خَيْرًا يَرَهُ) سورة الزلزلة ، الآية ، ( 7 ) ونهاهم عن كل شر محرَّم أو مكروه وتوعدهم بالعقاب على كل محظور جليله وحقيره ( وَمَنْ
The art of analogy is considered the first of the graphic arts, while
Ibn al-Mu'taz counted it in the second section of his wonderful book
was labeled with the art of simile due to his frequent use of the art of
simile in his poetry
Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreThe most popular medium that being used by people on the internet nowadays is video streaming. Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the
... Show MoreWireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8
The relationship between costs of environment and costs of product life – cycle. Boubtlessly when the economical unit exercise their productive works, they lead to pollution in water, air and soil as well as all stages of product life- cycle from Rans Dstage, production stage, packaging stage and finally abandonment stage- Pollution causes environmental costs. Lgnoring or hiding environmental costs and no taking them in consideration with product cost lead to a wrong account of preduot cost.
Therefore, environmental costs should be included and matched for all stages with in product costs to know which activities, processes
... Show More