Forest cover in Mosul Province experienced significant changes following the 2014 occupation. These changes can be effectively analyzed using multitemporal remote sensing imagery. This study aims to evaluate the ability of multi-temporal Landsat 8 images and the Forest Canopy Density (FCD) model to detect changes in forest canopy density in a protected forest in Mosul Governorate during the period from 2014 to 2025. The remote sensing data used in this research are Landsat 8 images captured on March 21, 2014, and April 4, 2025. The method employed is FCD modeling, which produces pixel-level canopy density estimates. The results of the FCD model are then used to analyze changes in canopy density following the occupation. The findings of this
... Show MoreInternal control system is a safety valve that preserves economic units assets and ensure the accuracy of financial data, as well as to obligation in the laws, regulations, administrative policies ,and improve the efficiency, effectiveness and economic of operation, so it has become imperative for these units attention to internal and developed control system The research problem in exposure the economic units when the exercise of their business to many of the risks to growth or hinder the achievement of its objectives and the risks (financial, operational, strategy, risk) and not it rely on risk Assessment according to modern scientific methods, as in Brown's risk Classification, Which led to the weakness of the internal control identif
... Show MoreSegmentation is the process of partition digital images into different parts depending on texture, color, or intensity, and can be used in different fields in order to segment and isolate the area to be partitioned. In this work images of the Moon obtained through observations in Astronomy and space dep. College of science university of Baghdad by ( Toward space telescopes and widespread used of a CCD camera) . Different segmentation methods were used to segment lunar craters. Different celestial objects cause craters when they crash into the surface of the Moon like asteroids and meteorites. Thousands of craters appears on the Moon's surface with ranges in size from meter to many kilometers, it provide insights into the age and ge
... Show MoreSegmentation is the process of partition digital images into different parts depending on texture, color, or intensity, and can be used in different fields in order to segment and isolate the area to be partitioned. In this work images of the Moon obtained through observations in Astronomy and space dep. College of science university of Baghdad by ( Toward space telescopes and widespread used of a CCD camera) . Different segmentation methods were used to segment lunar craters. Different celestial objects cause craters when they crash into the surface of the Moon like asteroids and meteorites. Thousands of craters appears on the Moon's surface with ranges in size from meter to many kilometers, it provide insights into the age and geology
... Show MoreThis study applies a discourse analysis framework to explore the portrayal of women in Maysloon Hadi’s novel (The Black Eyes) (2011), using Critical Discourse Analysis (CDA) and Norman Fairclough’s tri-dimensional model (1989) as the analytical foundation. It investigates the roles and challenges women face in the novel. While there is growing interest in the portrayal of women in literature, Iraqi literature—especially from the perspective of Iraqi women writers remains underexplored. Hadi’s *The Black Eyes* provides a unique case to examine this intersection. Despite the novel’s rich narrative, which offers insight into Iraqi women’s lives, there is a lack of comprehensive CDA to understand how its language constructs
... Show Moreفقدان الزوج يعد حدثًا يغير حياة النساء، مما يضطرهن إلى السباحة في عالم جديد مليء بالحزن والوحدة والشكوك. مع الوقت، تطورت طريقة تصوير الأرامل بشكل كبير تعكس التغييرات في الآراء والقيم الثقافية. تُمثل الأرامل تقليديًا بأنهن ضعيفات ومعتمدات في الأدب، مستندة إلى افتراض أنهن يفتقدن الدعم المالي بعد وفاة شركائهن. ومع ذلك، فإن هذا التصوير لا يعترف بتأثير الأرملة على الرفاهية والهوية الشخصية. يسعى هذا النص إلى
... Show MoreBacterial contamination of AL-Habania reservoir was studied during the period from February 2005 to January 2006; samples were collected from four stations (AL-Warrar, AL-Theban regulator, middle of the reservoir and the fourth was towards AL-Razzaza reservoir). Coliform bacteria, faecal Coliforms, Streptococci, and faecal Streptococci were used as parameters of bacterial contamination in waters through calculating the most probable number. Highest count of Coliform bacteria (1500 cell/100ml) was recorded at AL-Razaza during August, and the lowest count was less than (300 cell/100ml) in the rest of the collection stations for all months. Fecal Coliform bacteria ranged between less than 300 cells/100ml in all stations for all months to 700 c
... Show MoreThis paper proposes a better solution for EEG-based brain language signals classification, it is using machine learning and optimization algorithms. This project aims to replace the brain signal classification for language processing tasks by achieving the higher accuracy and speed process. Features extraction is performed using a modified Discrete Wavelet Transform (DWT) in this study which increases the capability of capturing signal characteristics appropriately by decomposing EEG signals into significant frequency components. A Gray Wolf Optimization (GWO) algorithm method is applied to improve the results and select the optimal features which achieves more accurate results by selecting impactful features with maximum relevance
... Show MoreAl2O3 and Al2O3–Al composite coatings were deposited on steel specimens using Oxy-acetylene gas thermal spray gun. Alumina was mixed with Aluminum in six groups of concentrations (0, 5, 10,12,15 and 20% ) Al2O3, Specimens were tested for corrosion using Potentiodynamic polarization technique. Further tests were conducted for the effect of temperature on polarization curve and the hardness tests for the coated specimens. At first, Modelling was carried out using MINITAB-19, least square method, as a 2nd degree nonlinear model, bad results were achieved because of the high nonlinearity. Better result w
Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show More