In this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performance measures are used as a criterion to decide which classifier is the best one to detect the images with high accuracy. Eventually, the simulation results show that each classifier detect the damage/no damage image with different performance measures and then makes it easy to select the best one.
The aim of this study to identify patterns of cerebral control (right and left) for second grade students in the collage of physical education and sports science of the University of Baghdad, as well as identify the definition of theThe Effect of Using the Bybee Strategy(5ES) according to Brain Control Patterns in Learning a Kinetic Series on Floor exercises in Artistic Gymnastics for menمجلة الرياضة المعاصرةالمجلد 19 العدد 1 عام 2020effect using the (Bybee) strategy (5ES) according to brain control patterns inlearning a Kinetic series on floor exercises In artistic gymnastics for men, andidentify the best combination between the four research groups learn, use Finderexperimental method research sample consi
... Show MoreIn the present work, a set of indoor Radon concentration measurements was carried out in a number of rooms and buildings of Science College in the University of Mustansiriyah for the first time in Iraq using RAD-7 detector which is an active method for short time measuring compared with the passive method in solid state nuclear track detectors (SSNTD's). The results show that, the Radon concentrations values vary from 9.85±1.7 Bq.m-3 to 94.21±34.7 Bq.m-3 with an average value 53.64±26 Bq.m-3 which is lower than the recommended action level 200-300 Bq/m3 [ICRP, 2009].
The values of the annual effective dose (A.E.D) vary from 0.25 mSv/y to 2.38 mSv/y, with an average value 1.46±0.67 mSv/y which is lower than the recommended the rang
In light of increasing demand for energy consumption due to life complexity and its requirements, which reflected on architecture in type and size, Environmental challenges have emerged in the need to reduce emissions and power consumption within the construction sector. Which urged designers to improve the environmental performance of buildings by adopting new design approaches, Invest digital technology to facilitate design decision-making, in short time, effort and cost. Which doesn’t stop at the limits of acceptable efficiency, but extends to the level of (the highest performance), which doesn’t provide by traditional approaches that adopted by researchers and local institutions in their studies and architectural practices, limit
... Show MoreGenetic variation was studied in 22 local and imported samples collected from local Iraqi market by using Single sequence repeat (SSR-PCR). Six primers set were used in this study. These primers produced 33 bands. Molecular weights of these bands ranged between 100 bp to 1500 bp. The number of polymorphic bands is 24, whereas the number of monomorphic bands is 9. The results of Dendrogram of the studied samples depended on SSR-PCR results by using Jaccard coefficient for genetic similarity was distributed the samples into 10 groups. This Dendrogram revealed a higher similarity between Iraqi/Balad green bell pepper and Iraqi/Yousifia green bell pepper with 1 value. This value is the highest between samples in comparison with lowest values (0
... Show MoreThe current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show MoreThe research aims to know the effectiveness of a training program based on multiple intelligence theory in developing literary thinking among students of the Arabic Language Department at Ibn Rushd School of Humanities and to achieve the goal of research, the Safaris Research Institute, and the research community of Arabic language students in the Faculty of Education the third section of Arabic Language: The research sample consists of (71) students. Divided into (35) students in the experimental group and (36) students in the control group, the researcher balanced between the two groups with variables (intelligence, testing of tribal literary thinking, and time age in months), and after using the T-test for two independent samples, the
... Show MoreDeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show More