Nineveh province in Iraq has experienced a process of land cover conversion and vegetation loss especially in last decades. It is important to get accurate information on vegetation loss and changes in areas that are used for agriculture. Among the most effective methods to study and get information about this phenomenon is remote sensing technology.Since classical approaches lack of accuracy, artificial intelligence has been introduced to strengthen feature detection which leads to better classification. This paper uses ant colony algorithm to study and classify part of Nineveh province land into six classes. These are Agriculture land/flood plane, Water, Outcrop, Origin of early sand sheet, Desertable area, and Sand dunes. The variation in these six classes from 1987 to 2009 is shown. Results show that agriculture region and flood plain decreased from around 31% in 1987 to 11.2% of total area in 2009 while origin of early sand sheet and desertable area increased from 42.7% to around 49%. Beside that sand dune appears in 2009 to form about 26.47% of total area under study.
The recent developments in information technology have made major changes in all fields. The transfer of information through networks has become irreplaceable due to its advantages in facilitating the requirements of modern life through developing methods of storing and distributing information. This in turn has led to an increase in information problems and risks that threaten the security of the institution’s information and can be used in distributed systems environment.
This study focused on two parts; the first is to review the most important applications of the graph theory in the field of network security, and the second is focused on the possibility of using the Euler graph as a Method Object that is employed in Remote Method Invocation (RMI) technique. This algorithm was compared with the most popular algorithms, such as RSA and 3DES. The results were acceptable and need to be improved in the future.
The Spoofing Attack is dangerous and complex to networks and clouds; an attacker fakes a legitimate user address and launches his attack. Those who control the cloud have a big role to play in preventing and detecting these attacks. This research focuses on enhancing an algorithm called HCF (Hop Count Filtering Algorithm) helps to get rid of the weaknesses of this algorithm.
The concept of cloud computing has recently changed how hardware, software, and information are handled. However, security challenges and credibility requirements have never changed and may have increased. Protecting cloud computing and providing security for its resources and users is one of the critical challenges. As a result, most users are afraid to use their resources, because many security problems must be met. For example, authentication and reliability are major security constraints and must be provided in a cloud computing environment. There is a wide range of authentication protocols in use, but the researcher has recommended the Kerberos protocol to represent and test it in a complex environment such as a mixed cloud environment.
A model has been developed to implement Kerberos authentication in a hybrid cloud computing environment to securely access the cloud computing services provided. This model is represented using the OPNET Modeler 14.5 simulation system. The network efficiency was measured before and after the hacker. Findings presented in this research are supporting the ability of the Kerberos protocol to prevent illegal access to cloud computing services, whether from within the private cloud or the public cloud. While maintaining the efficient performance of the network.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.