A digital elevation model (DEM) is a digital representation of ground surface topography or terrain. It can be represented as a raster (a grid of squares) and it is commonly estimated by utilizing remote sensing techniques, or from land surveying. In this research a 3D building of Baghdad university campus have been performed using DEM, where the easting, northing, and elevation of 400 locations have been obtained by field survey using global positioning system (GPS). The image of the investigated area has been extracted from QuickBird satellite sensor (with spatial resolution of 0.6 m). This image has been geo-referenced by selecting ground control points of the GPS. The rectification is running, using 1st order polynomial transformation. Estimation of the ground layer elevation is carried out by spline and IDW interpolation, the buildings have been delineated as polygons with given real heights in the second layer. The mosaic algorithm has then been applied between the two layers to perform the final DEM creation process. Finally, the estimated DEM have been used to constructing 3-D building.
Global warming has a serious impact on the survival of organisms. Very few studies have considered the effect of global warming as a mathematical model. The effect of global warming on the carrying capacity of prey and predators has not been studied before. In this article, an ecological model describing the relationship between prey and predator and the effect of global warming on the carrying capacity of prey was studied. Moreover, the wind speed was considered an influencing factor in the predation process after developing the function that describes it. From a biological perspective, the nonnegativity and uniform bounded of all solutions for the model are proven. The existence of equilibria for the model and its local stability is inves
... Show MoreIn this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreThe speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi
... Show MoreAbstract:
Witness the current business environment changes rapidly reflected on the performance of the facility wishing to stay , which is no longer style reaction enough to handle installations with their environment , and quickly began to lose its luster with the emergence of a message and the vision of contemporary business environment from a set of parts interacting with each other and the concept of behavioral includes all dimensions of performance, it is imperative to adopt a system installations influence variables and positive interaction through the development of strategic plans and the use of implementation and follow-up strategies to ensure the effectiveness of the method for meas
... Show MoreThe research aims to identify the extent to which Iraqi private banks practice profit management motivated by reducing the taxable base by increasing the provision for loan losses by relying on the LLP it model, which consists of a main independent variable (net profit before tax) and independent sub-variables (bank size, total debts to total equity, loans granted to total obligations) under the name of the variables governing the banking business. (Colmgrove-Smirnov) was used to test the normal distribution of data for all banks during the period 2017-2020, and then find the correlation between the main independent variable sub and the dependent variable by means of the correlation coefficient person, and then using the multiple
... Show MoreThis research sheds light on those discrepancies in the use of ornaments, adornment and perfumes, as well as the art of cosmetics, in two important civilizations, namely, the Mesopotamian civilization as the earlier civilization, and the civilization of Yemen, which represents the first Arab civilization. Through the foregoing, our research includes two topics, the first topic included the history of the use of decorations, ornaments and perfumes in the civilization of Mesopotamia, while the second topic included the study of ornaments, adornment and cosmetic art in the ancient civilization of Yemen. And then the research came out with a number of conclusions that the researcher considers very important to highlight the differences and f
... Show More