The study consisted in the development and use of a practical method to detect and
monitor, analyze and produce maps of changes in land use and land cover in the district of
Mahmudiya in Baghdad during the period 1990-2007 using the applications of remote sensing
techniques and with the assisstant of geographic information systems (GIS),as a valuable
contribution to land degradation studies.
This study is based maiuly on the processing on two subsets of landsat5 TM images picked up
in August 1990 and 2007 respectively in order to facilitate comparision and were thengeometrically and radiometrcally calibrated ,to used for digital classification purposes using
maximum liklihoods classification or six spectral bands of both images as input (with the
thermal bands being excluded)for procedures of change detection proposed, as well as the use
of installation chromatograpiy analysis and visual interpretation using spectral bands (2,4,7)
and (2,3,4) respectively for the preparation of a maps foe the patterns of land cover and land
uses in the study area.
Change detection results showed an increase in the area of class urban areas, in the year
1990, the area of this product 9.8 km 2, and in the year 2007 has become a 60.9 km 2 area of
the image, and an increase in the area of class agricultural land unexploited In 1990, the area
of this product 1290.50 km 2, and the year 2007 has become a 1610.33 km2 of the image, and
increase the area of classified land saline, in the year 1990, the area of this product 183.27 km
2, and in the year 2007 has become a 328.31 km2 of the image as well as an increase in the
area of class cover the water, in the year 1990 was space This product was 46.2 km 2, and in
the year 2007 has become a 62.5 km 2 of the area of the image, on the other hand decreased
space class vegetation In 1990, the area of this product 1140 km 2, and in the year 2007 has
become a 575.31 km 2, and also a decrease in class of arid lands In the year 1990, the area of
this product 407.12 km 2, and in the year 2007 has become a 261.95 km 2 area of the image.
The results revealed the reasous of land degradation in the district of Mahmudiya It
showed that the reason for an increase in the cover of water is an increase in human
activities,including the increase in artificial lakes, fish, this is important reason of land
degradation to decrease in a agriculture area, and this led decline to increased salinization of
the soil, either decrease in the arid land was due to the increase of urban land at the expense of
the land reclamation has happened in these arid lands
Keywords : land degradation , Remote Sensing , land covor , land use.
CNC machine is used to machine complex or simple shapes at higher speed with maximum accuracy and minimum error. In this paper a previously designed CNC control system is used to machine ellipses and polylines. The sample needs to be machined is drawn by using one of the drawing software like AUTOCAD® or 3D MAX and is saved in a well-known file format (DXF) then that file is fed to the CNC machine controller by the CNC operator then that part will be machined by the CNC machine. The CNC controller using developed algorithms that reads the DXF file feeds to the machine, extracts the shapes from the file and generates commands to move the CNC machine axes so that these shapes can be machined.
Numerical simulations are carried out to evaluate the coherence concept’s effect on the performance regarding the optical system, when observing and imaging the planet’s surface. In numerous optical approaches, the coherence qualities of light sources play an important role. This paper provides an overview about the mathematical formulation of temporal and spatial coherence and incoherence properties of light sources. The circular aperture was used to describe the optical system like a telescope. The simulation results show that diffraction-limited for incoherent imaging system certainly improves the image. Yet, the quality of the image is degraded by the light source's highly spatial and temporal coherence properties, resulting in a
... Show MoreThis study delves into the design optimization of a hydropower harvesting system, exploring various parameters and their influence on system performance. By modifying the variables within the model to suit different flow conditions, a judiciously optimized design is attainable. Notably, the lift force generated is found to be intricately linked to the strategic interplay of the bluff body's location, cylinder dimensions, and flow velocity. The findings culminate in the establishment of empirical equations, one for lift force and another for displacement, based on the force equation. Many energy harvesting approaches hinge on the reciprocating motion inherent to the structural system. The methodology developed in this study emerges as a pot
... Show MoreThe aim of this book is to present a method for solving high order ordinary differential equations with two point boundary condition of the different kind, we propose semi-analytic technique using two-point osculatory interpolation to construct polynomial solution. The original problem is concerned using two-points osculatory interpolation with the fit equal numbers of derivatives at the end points of an interval [0 , 1] . Also, we discussion the existence and uniqueness of solutions and many examples are presented to demonstrate the applicability, accuracy and efficiency of the methods by compared with conventional method .i.e. VIDM , Septic B-Spline , , NIM , HPM, Haar wavelets on one hand and to confirm the order convergence on the other
... Show MoreAW Tarik, AW Ali T, A Salah, Journal of faculity of medicine Baghdad university, 2014 - Cited by 3
The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreThe aim of the current study was to evaluate the knowledge and perception of the fifth stage pharmacy students (college of pharmacy/ University of Baghdad /Iraq) regarding generic medicines. This study is a cross-sectional study carried in a college of pharmacy /University of Baghdad during the period from (November 2018- March 2019). The number of students included in the current study was 168 undergraduate stager pharmacists. A questionnaire was used to collect data of the study. Nearly 86% of the students said that they had heard of generic and brand medicines, and pharmacy was the main source of knowledge regarding generic medicines (66.7%). About (33.3%) of the respondents agreed that generic medicines are bioequivalent to br
... Show MoreThe characteristic of our time is the tremendous technological progress and the wide use of the Internet. Children have had a large share of this progress.as they are becoming fond of having the technological equipment of tablets and mobile phones which become indispensable for these children cannot do without them .
Recently, the phenomenon of using mobile phones and tablets by children has become more widespread, and the society in general and parents, in particular, have ignored the reasons for their health .Despite the many advantages and benefits for children who are well trained to use these devices properly that have enhanced their cognitive and social abilities, there are many disadvantages that could harm children's growth if