• No results found

Al Batin Alluvial Fan, Southern Iraq

N/A
N/A
Protected

Academic year: 2020

Share "Al Batin Alluvial Fan, Southern Iraq"

Copied!
13
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Figure 1. Location map of the studied area Right) color coded of DEMs adopted from Shuttle Radar Topography Mission (SRTM)
Table 1. Image characteristics of Landsat 8 OLI and TIRS scene.
Figure 2. Geological map of the studied area [17]. (The four stag-es of the alluvial fan are distinguished by four sets of arrows)
Figure 3. Shaded relief image derived from DEMs of SRTM of the studied area. Note the NNW-SSE lineament (A - B), C - D is the southern limit of the depression, which represents the Abu Jir-Euphrates Fault Zone, AC is an ancient distributary course of the E
+7

References

Related documents

Kordts-Freudinger and Geithner (2013) investigated whether differences in mean scores between paper and online SETs were the result of different evaluation settings (i.e.,

Commercial aircraft programs inventory included the following amounts related to the 747 program: $448 of deferred production costs at December 31, 2011, net of previously

The corona radiata consists of one or more layers of follicular cells that surround the zona pellucida, the polar body, and the secondary oocyte.. The corona radiata is dispersed

○ If BP elevated, think primary aldosteronism, Cushing’s, renal artery stenosis, ○ If BP normal, think hypomagnesemia, severe hypoK, Bartter’s, NaHCO3,

I problematize three family images associated with the design and implementation of housing projects: the bureaucratic family, envisaged by policymakers as conflating with a model

For the broad samples of men and women in East and West Germany every first graph in Fig- ure 1 to 4 (Appendix) shows considerable and well-determined locking-in effects during the

The main aim of the present study was to specify and test a structural model to examine the relationships between four psychopathy dimensions (Interpersonal Manipulation, Callous

The encryption operation for PBES2 consists of the following steps, which encrypt a message M under a password P to produce a ciphertext C, applying a