Incorporating the LiDAR sensor in the most recent Apple devices represents a substantial development in 3D mapping technology. Meanwhile, Apple's Lidar is still a new sensor. Therefore, this article reviews the potential uses of the Apple Lidar sensor in various fields, including engineering and construction, focusing on indoor and outdoor as-built 3D mapping and cultural heritage conservation. The affordable cost and shorter observation times compared to traditional surveying and other remote sensing techniques make the Apple Lidar an attractive choice among scholars and professionals. This article highlights the need for continued research on the Apple LiDAR sensor technology while discussing its specifications and limitations. A comprehensive review found that the Apple LiDAR sensor has shown promise in capturing 3D point clouds of small to medium-sized objects with exceptional detail. This technology offers a cost-effective and accessible option to scan areas faster and analyze data more quickly and automatically for 3D mapping and modelling in indoor and outdoor environments, particularly in areas with restricted access when using other traditional techniques. It also opens the door for more sophisticated applications in future studies, including cultural heritage conservation, archaeological investigations and feature detection, building health monitoring and many more.
In recent days, the escalating need to seamlessly transfer data traffic without discontinuities across the Internet network has exerted immense pressure on the capacity of these networks. Consequently, this surge in demand has resulted in the disruption of traffic flow continuity. Despite the emergence of intelligent networking technologies such as software-defined networking, network cloudification, and network function virtualization, they still need to improve their performance. Our proposal provides a novel solution to tackle traffic flow continuity by controlling the selected packet header bits (Differentiated Services Code Point (DSCP)) that govern the traffic flow priority. By setting the DSCP bits, we can determine the appropriate p
... Show MoreBackground: Lymphomas are group of diseases caused by malignant lymphocytes that accumulate in lymph nodes and caused the characteristics lymphadenopathy. Occasionally, they may spill over into blood or infiltrate organs outside the lymphoid tissue. The major subdivision of lymphomas is into Hodgkin lymphoma and non–Hodgkin lymphoma and this is based on the histologic presence of Reed-Sternberg cells in Hodgkin lymphoma. Salivary immunoglobulin A is the prominent immunoglobulin and is considered to be the main specific defense mechanism in oral cavity. The aim of this study was to determine the level of salivary immunoglobulin A in lymphoma patients before and after chemotherapy treatment. Subjects, materials and methods: The study i
... Show MorePragmatics of translation is mainly concerned with how social contexts have their own influence on both the source text (ST) initiator's linguistic choices and the translator's interpretation of the meanings intended in the target text (TT). In translation, socio-pragmatic failure(SPF), as part of cross-cultural failure, generally refers to a translator's misuse or misunderstanding of the social conditions placed on language in use. In addition, this paper aims to illustrate the importance of SPF in cross-cultural translation via identifying that such kind of failure most likely leads to cross-cultural communication breakdown. Besides, this paper attempts to answer the question of whether translators from English into Arabic or vice versa h
... Show MoreIn modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu
... Show MoreThe paper deals with claims in construction projects in Iraq and studies their types, causes, impacts, resolution methods and then proposes a management system to control the impacts of claims. Two parts have been done to achieve the research objective (theoretical part and practical part). The findings showed that the main types of the claims are extra work claims, different site condition claims, delay claims and the main causes of the claims are variation of the orders, design errors and omission, delay in payments by owner, variation in quantities and scheduling errors. The claims have bad impacts on the cost by increasing (10% to 25%) and also on the duration of the project by increasing from (25% to 50%).The negotiation is the main
... Show MoreTraditional accounting takes only one dimension (economic) in calculating the value added of the company, and all other aspects (including environmental and social) are neglected, and despite the emergence of Sustainability Accounting and the interest of companies in preparing sustainability reports, these reports are suffering from many problems, including multiple metrics used in measuring companies (cash, quantity and lavish). In addition, these reports may reach dozens of pages in some companies and this causes the problem (information overload) which affects the qualitative properties of accounting information such as appropriate and relative, which requires the need to find a tool that can measure the Sustainability Unit of
... Show Moreيعد هذا النص أحد النصوص المسمارية المصادرة التي بحوزة المتحف العراقي، ويحمل الرقم المتحفي (235869)، قياساته )12،7x 6x 2،5سم). يتضمن مدخولات كميات من الشعير،أرخ النص الى عصر أور الثالثة (2012-2004 ق.م) و يعود الى السنة الثالثة من حكم الملك أبي-سين (2028-2004 ق.م)،أن الشخصية الرئيسة في هذا النص هو)با-اَ-كا مسمن الماشية( من مدينة أري-ساكرك، ومقارنته مع النصوص المسمارية المنشورة التي تعود الى أرشيفه يبلغ عددها (196) نصاً تضمنت نشاطاته م
... Show MoreAbstract
People are supposed to use language harmoniously and compatibly. However, aggression may characterize much of human communication. Aggression has long been recognized as a negative anti-social issue that prevails in most personal interactions. If it abounds in familial communications, it is more dangerous due to its harmful effects on individuals, and consequently on societies. Aggression refers to all the instances in which we try to get our way without any consideration for others. Moriarty’s novel (2014), Big Little Lies, is argued to represent the patterns of aggressive communications. This study aims to find out the motivations behind aggressive language in familial communication in this
... Show More