Preferred Language
Articles
/
1hefZZIBVTCNdQwCeK73
Enhancing Spatial Accuracy of OpenStreetMap Data: A Geometric Approach
...Show More Authors

OpenStreetMap (OSM), recognised for its current and readily accessible spatial database, frequently serves regions lacking precise data at the necessary granularity. Global collaboration among OSM contributors presents challenges to data quality and uniformity, exacerbated by the sheer volume of input and indistinct data annotation protocols. This study presents a methodological improvement in the spatial accuracy of OSM datasets centred over Baghdad, Iraq, utilising data derived from OSM services and satellite imagery. An analytical focus was placed on two geometric correction methods: a two-dimensional polynomial affine transformation and a two-dimensional polynomial conformal transformation. The former involves twelve coefficients for adjustment, while the latter encompasses six. Analysis within the selected region exposed variances in positional accuracy, with distinctions evident between Easting (E) and Northing (N) coordinates. Empirical results indicated that the conformal transformation method reduced the Root Mean Square Error (RMSE) by 4.434 meters in the amended OSM data. Contrastingly, the affine transformation method exhibited a further reduction in total RMSE by 4.053 meters. The deployment of these proposed techniques substantiates a marked enhancement in the geometric fidelity of OSM data. The refined datasets have significant applications, extending to the representation of roadmaps, the analysis of traffic flow, and the facilitation of urban planning initiatives.

Scopus Crossref
View Publication
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (23)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Fri Oct 19 2018
Journal Name
Journal Of Economics And Administrative Sciences
The Universities Governance Accourding to Incremental Approach for Strategic Decision
...Show More Authors

The research's purpose is to highlight the role that the Approach of the strategic decision play in universities' governorships, assuming that the universities' governorship are definite result that can be reached by modern universities through their active strategic decisions that they take based on the correct way of thinking and the appropriate entrance that achieve the strategic goal of these decisions. The current research depended on two curriculums necessitated by the research requirement which are the analytical description curriculum and compare curriculum, the field research was done in the (Baghdad and Al-Mustansiriya) universities, the samples that were selected were the president, assistants and members of the board'

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 02 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Enhancing Auditor Reporting In Light Of International Assurance Standards And Their Reflection On Activating The Credibility Of Sustainability Reports
...Show More Authors

The Assurance Services Are Represented By Expressing A Clear And Independent Opinion On All Financial And Non-Financial Information, As It Is Broader Than The Services Related To Auditing Financial Statements And Expressing Opinion (Certification) And Extends Them To A Wider Range, And It Is Possible To Distinguish Between Auditing And Certification Services And Confirming That Audit Services Relate To Expressing Opinion On Financial Statements And Certification Services Related To By Expressing An Opinion On A Wide Range Of Financial Information And More Broadly Than The Financial Statements And Assurance Services That Include Expressing An Opinion On Integrated Financial And Non-Financial Information And From This Standpoint Came The I

... Show More
View Publication Preview PDF
Publication Date
Sat Nov 28 2020
Journal Name
Iraqi Journal Of Science
Color Image Compression System by using Block Categorization Based on Spatial Details and DCT Followed by Improved Entropy Encoder
...Show More Authors

In this paper, a new high-performance lossy compression technique based on DCT is proposed. The image is partitioned into blocks of a size of NxN (where N is multiple of 2), each block is categorized whether it is high frequency (uncorrelated block) or low frequency (correlated block) according to its spatial details, this done by calculating the energy of block by taking the absolute sum of differential pulse code modulation (DPCM) differences between pixels to determine the level of correlation by using a specified threshold value. The image blocks will be scanned and converted into 1D vectors using horizontal scan order. Then, 1D-DCT is applied for each vector to produce transform coefficients. The transformed coefficients will be qua

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Fri Oct 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Novel Approach of CFIA Technique for Assaying of Furosemide (Sulfa Drug) as Antibacterial Agent in Pharmaceutical and Biological Samples Using Potassium Ferricyanide as Oxidizing Agent
...Show More Authors

Furosemide drug determination in pharmaceutical and biological urine samples using a novel continuous flow-injection analysis technique that is simple, rapid, sensitive and economical. The complex formed by the reaction of furosemide and O-phenylenediamine with oxidative agent K3[Fe(CN)6] to produce an orange-yellow colored product at 460 nm was the basis for the proposed method.  The proposed method’s linearity ranges (3-100) μg.mL-1and (1-50) μg.mL-1 for CFIA/merging zone methods and batch .The detection limit and Limit of quantification values were 2.7502 μg.mL-1  and 9.1697 μg.mL-1 the relative standard deviation was 0.7143 %, and the average recovery is 98.80%

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 09 2024
Journal Name
Sustainability
Enhancing Asphalt Performance and Its Long-Term Sustainability with Nano Calcium Carbonate and Nano Hydrated Lime
...Show More Authors

Nanomaterials enhance the performance of both asphalt binders and asphalt mixtures. They also improve asphalt durability, which reduces resource consumption and environmental impact in the long term associated with the production and transportation of asphalt materials. Thus, this paper studies the effectiveness of Nano Calcium Carbonate (Nano CaCO3) and Nano Hydrated Lime (NHL) as modifiers and examines their impact on ranges from 0% to 10% through comprehensive laboratory tests. Softening point, penetration, storage stability, viscosity, and mass loss due to short-term aging using the Rolling Thin Film Oven Test (RTFO) were performed on asphalt binders. Results indicated a significant improvement in binder stiffness, particularly

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Optical Fiber Technology
Enhancing refractive index sensitivity using micro-tapered long-period fiber grating inscribed in biconical tapered fiber
...Show More Authors

View Publication
Scopus (16)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
International Journal Of Economics And Finance Studies
THE ROLE OF TARGET COST MANAGEMENT APPROACH IN REDUCING COSTS FOR THE ACHIEVEMENT OF COMPETITIVE ADVANTAGE AS A MEDIATOR: AN APPLIED STUDY OF THE IRAQI ELECTRICAL INDUSTRY
...Show More Authors

Scopus (15)
Scopus
Publication Date
Tue Nov 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Implementation of new Secure Mechanism for Data Deduplication in Hybrid Cloud
...Show More Authors

Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of

... Show More
View Publication Preview PDF