Preferred Language
Articles
/
1hefZZIBVTCNdQwCeK73
Enhancing Spatial Accuracy of OpenStreetMap Data: A Geometric Approach
...Show More Authors

OpenStreetMap (OSM), recognised for its current and readily accessible spatial database, frequently serves regions lacking precise data at the necessary granularity. Global collaboration among OSM contributors presents challenges to data quality and uniformity, exacerbated by the sheer volume of input and indistinct data annotation protocols. This study presents a methodological improvement in the spatial accuracy of OSM datasets centred over Baghdad, Iraq, utilising data derived from OSM services and satellite imagery. An analytical focus was placed on two geometric correction methods: a two-dimensional polynomial affine transformation and a two-dimensional polynomial conformal transformation. The former involves twelve coefficients for adjustment, while the latter encompasses six. Analysis within the selected region exposed variances in positional accuracy, with distinctions evident between Easting (E) and Northing (N) coordinates. Empirical results indicated that the conformal transformation method reduced the Root Mean Square Error (RMSE) by 4.434 meters in the amended OSM data. Contrastingly, the affine transformation method exhibited a further reduction in total RMSE by 4.053 meters. The deployment of these proposed techniques substantiates a marked enhancement in the geometric fidelity of OSM data. The refined datasets have significant applications, extending to the representation of roadmaps, the analysis of traffic flow, and the facilitation of urban planning initiatives.

Scopus Crossref
View Publication
Publication Date
Sun Mar 04 2018
Journal Name
Iraqi Journal Of Science
Improving Detection Rate of the Network Intrusion Detection System Based on Wrapper Feature Selection Approach
...Show More Authors

Regarding the security of computer systems, the intrusion detection systems (IDSs) are essential components for the detection of attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in real time. A major drawback of the IDS is their inability to provide adequate sensitivity and accuracy, coupled with their failure in processing enormous data. The issue of classification time is greatly reduced with the IDS through feature selection. In this paper, a new feature selection algorithm based on Firefly Algorithm (FA) is proposed. In addition, the naïve bayesian classifier is used to discriminate attack behaviour from normal behaviour in the network tra

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 30 2006
Journal Name
College Of Islamic Sciences
The Messenger’s approach to preaching (the Meccan stage in light of the Qur’an and Sunnah)
...Show More Authors

First: People’s need for advocacy:

Calling for a legal necessity for all people, regardless of their races, colours, tongues, and culture, to explain the truth, spread fear, bring benefits, ward off evil, regulate a person’s relationship with his Lord, and his relationship with creatures, so that he knows his money and what he owes.

All of creation is in dire need of the call to God’s religion with insight due to their inability to reach out to goodness, righteousness, guidance, and success on their own. Man is limited in thinking in this universe, limited in his resolve, unable to know what will improve his affairs in the two worlds. His need for religion is one of the necessities of his life, and one of the comple

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 13 2020
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
Robust Approach of Optimal Control for DC Motor in Robotic Arm System using Matlab Environment
...Show More Authors

Modern automation robotics have replaced many human workers in industrial factories around the globe. The robotic arms are used for several manufacturing applications, and their responses required optimal control. In this paper, a robust approach of optimal position control for a DC motor in the robotic arm system is proposed. The general component of the automation system is first introduced. The mathematical model and the corresponding transfer functions of a DC motor in the robotic arm system are presented.  The investigations of using DC motor in the robotic arm system without controller lead to poor system performance. Therefore, the analysis and design of a Proportional plus Integration plus Divertive (PID) controller is illustrated.

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Mon May 31 2021
Journal Name
Iraqi Journal Of Science
Improving Security of the Crypto-Stego Approach using Time Sequence Dictionary and Spacing Modification Techniques
...Show More Authors

Cryptography steganography is a practical tool for data security. Hybridization of the cryptography with steganography can provide more security by taking advantage of each technique. This work proposes a method for improving the crypto-stego method by utilizing the proposed dictionary method to modified ciphertext. After that, the modified encrypt ciphertext id was hidden in the text by using the proposed method. For cryptography, an Advanced Encryption Standard (AES) was utilized to encrypt the message. The AES employed a 128bit block size and 256bit key size. The ciphertext characters were then replaced by the characters identified by a dictionary list. The dictionary is time-dependent, where each of the equivalent words shift based o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 24 2023
Journal Name
Iraqi Journal Of Science
Depositional Environment of the Gercus Formation in Jabal Haibat Sultan, NE Iraq; New Sedimentological Approach
...Show More Authors

Sedimentary structures of Gercus Formation in NE Iraq was little studied in the last decades. In this study the identified sedimentary structures display alternative graded and fining upward cycles, load and flute casts, submarine channels, sand and clay balls and pillow structures, convolute and slump beddings, of marine turbidity origin. The foreland part of Tethys basin characterized by deep marine Tanjero and Kolosh Formations followed by the Gercus formation with conformable relationships. The Eocene aged Flysch comprises predominantly litharenitic sandstones and interbedded mudstones, both of turbiditic affinities and most likely derived from a NE Arabian Plate source. The sediments provide excellent examples of distal fan sands as

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Pharmaceutical Negative Results
Phytocompound of pure thymol inhibit COVID-19 by binding to ACE2 receptor: In silico approach
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sat Jan 18 2025
Journal Name
Journal Wlkalam
Earthquakes in the Holy Qur’an and the Hadith of the Noble Prophet, an intellectual approach
...Show More Authors

Earthquakes in the Holy Qur’an and the Hadith of the Noble Prophet, an intellectual approach

View Publication Preview PDF
Publication Date
Sat Jan 18 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Acceleration of canine movement by laser assisted flapless corticotomy [An innovative approach in clinical orthodontics]
...Show More Authors

Background: Corticotomy-assisted orthodontic treatment is done to induce a state of increased tissue turnover and transient osteopenia, which is followed by a faster rate of orthodontic tooth movement. It considered as an adjunct treatment option for orthodontic treatment of adults. The aim of this Study was to elucidate the effectiveness of a new surgical approach for acceleration of maxillary canine retraction in human with laser assisted flapless corticotomy and evaluate its effect on vitality of pulp and gingival sulcus depth. Materials and methods: the sample comprised of 15 Iraqi patients (9 females and 6 males; mean age 21.7), who were required extraction for their maxillary first premolars followed by retraction of the canines as pa

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2014
Journal Name
Proceedings Of The Aintec 2014 On Asian Internet Engineering Conference - Aintec '14
LTE Peak Data Rate Estimation Using Modified alpha-Shannon Capacity Formula
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Fri Jun 01 2018
Journal Name
International Journal Of Computer Science Trends And Technology
Secure Video Data Deduplication in the Cloud Storage Using Compressive Sensing
...Show More Authors

Cloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize

... Show More
View Publication Preview PDF