Digital change detection is the process that helps in determining the changes associated with land use and land cover properties with reference to geo-registered multi temporal remote sensing data. In this research change detection techniques have been employed to detect the changes in marshes in south of Iraq for two period the first one from 1973 to 1984 and the other from 1973 to 2014 three satellite images had been captured by land sat in different period. Preprocessing such as geo-registered, rectification and mosaic process have been done to prepare the satellite images for monitoring process. supervised classification techniques such maximum likelihood classification has been used to classify the studied area, change detection after classification have been implemented between the new classes of adopted images, and finally change detection using matched filter was applied on the region of interest for each class.
Water pollution is an issue that can be exacerbated by drought as increased concentrations of unwanted substances are a consequence of lower water levels. Polluted water that flows into natural marshlands leads to the deposition of pollutants in the interior of the marsh. Here we present evidence that the interior of the Central Marsh (CM) in southern Iraq suffers from higher levels of pollution than areas closer to the source of water entering the marsh (the Euphrates River). A 1.7m embankment that halts the flow of the Euphrates is only infrequently breached and so the CM is effectively the terminal destination of the waters (and their associated pollutants and agricultural waste) flowing from the West of Iraq.
A range of water
... Show MoreThe study aimed to reach the best rating for the views and variables in the totals characterized by qualities and characteristics common within each group and distinguish them from aggregates other for the purpose of distinguishing between Iraqi provinces which suffer from deprivation, for the purpose of identifying the status of those provinces in the early allowing interested parties and regulators to intervene to take appropriate corrective action in a timely manner. Style has been used cluster analysis Cluster analysis to reach the best rating to those totals from the provinces that suffer from problems, where the provinces were classified, based on the variables (Edu
... Show MoreThe laboratory experiment was conducted in the laboratories of the Musayyib Bridge Company for Molecular Analyzes in the year 2021-2022 to study the molecular analysis of the inbreed lines and their hybrids F1 to estimate the genetic variation at the level of DNA shown by the selected pure inbreed lines and the resulting hybrids F1 of the flowering gene. Five pure inbreed lines of maize were selected (ZA17WR) Late, ZM74, Late, ZM19, Early ZM49WZ (Zi17WZ, Late, ZM49W3E) and their resulting hybrids, according to the study objective, from fifteen different inbreed lines with flowering time. The five inbreed lines were planted for four seasons (spring and fall 2019) and (spring and fall 2
Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou
... Show MoreA dust storm in Iraq is a climatic phenomenon common in arid and semi-arid regions . The frequency of the occurrence has increased drastically in the last decade and it is increasing continuously .Baghdad city like the rest of Iraq is suffering from the significant increase in dust storms . In this research , the study of the phenomenon of dust storms for all types (Suspended dust , rising dust , dust storm) , and its relationship with some climate variables (Temperature , rainfall ,wind speed) .The statement of the impact of climate change on this phenomenon to Baghdad station for the period (1981 – 2012) . Time series has been addressing the phenomenon of storms and cli
... Show MoreEvaporation is one of the major components of the hydrological cycle in the nature, thus its accurate estimation is so important in the planning and management of the irrigation practices and to assess water availability and requirements. The aim of this study is to investigate the ability of fuzzy inference system for estimating monthly pan evaporation form meteorological data. The study has been carried out depending on 261 monthly measurements of each of temperature (T), relative humidity (RH), and wind speed (W) which have been available in Emara meteorological station, southern Iraq. Three different fuzzy models comprising various combinations of monthly climatic variables (temperature, wind speed, and relative humidity) were developed
... Show MoreThe Tel Hajar formation in the studied area has been divided into five microfacics units:
1) Fine hiogenic dolomite facies.
2) Sandy rich dolomite facies.
3) Dolomite diagenetic facies.
4) Recrystal1ized wackestone in microfacies.
5) Mudsione facies.
Microfacics reflect shallow marine water with open Circulation in the lower part of the formation and the environment of the upper is enclosed between upper tide and tide. The most important diagenesis was recrystallization and spary calcite deposit inside fossils chambers and pores.
The rapid rise in the use of artificially generated faces has significantly increased the risk of identity theft in biometric authentication systems. Modern facial recognition technologies are now vulnerable to sophisticated attacks using printed images, replayed videos, and highly realistic 3D masks. This creates an urgent need for advanced, reliable, and mobile-compatible fake face detection systems. Research indicates that while deep learning models have demonstrated strong performance in detecting artificially generated faces, deploying these models on consumer mobile devices remains challenging due to limitations in computing power, memory, privacy, and processing speed. This paper highlights several key challenges: (1) optimiz
... Show More