Incorporating the LiDAR sensor in the most recent Apple devices represents a substantial development in 3D mapping technology. Meanwhile, Apple's Lidar is still a new sensor. Therefore, this article reviews the potential uses of the Apple Lidar sensor in various fields, including engineering and construction, focusing on indoor and outdoor as-built 3D mapping and cultural heritage conservation. The affordable cost and shorter observation times compared to traditional surveying and other remote sensing techniques make the Apple Lidar an attractive choice among scholars and professionals. This article highlights the need for continued research on the Apple LiDAR sensor technology while discussing its specifications and limitations. A comprehensive review found that the Apple LiDAR sensor has shown promise in capturing 3D point clouds of small to medium-sized objects with exceptional detail. This technology offers a cost-effective and accessible option to scan areas faster and analyze data more quickly and automatically for 3D mapping and modelling in indoor and outdoor environments, particularly in areas with restricted access when using other traditional techniques. It also opens the door for more sophisticated applications in future studies, including cultural heritage conservation, archaeological investigations and feature detection, building health monitoring and many more.
In many scientific fields, Bayesian models are commonly used in recent research. This research presents a new Bayesian model for estimating parameters and forecasting using the Gibbs sampler algorithm. Posterior distributions are generated using the inverse gamma distribution and the multivariate normal distribution as prior distributions. The new method was used to investigate and summaries Bayesian statistics' posterior distribution. The theory and derivation of the posterior distribution are explained in detail in this paper. The proposed approach is applied to three simulation datasets of 100, 300, and 500 sample sizes. Also, the procedure was extended to the real dataset called the rock intensity dataset. The actual dataset is collecte
... Show MoreNotes are given regarding new record species of the braconid parasite short note in Iraq. That is Apanteles angalcti it is found to parasitize early larval instaxs of Ectomyslois ceratontae, one of the most serious pests of pomegra- nate fruit.
In modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu
... Show MoreThis paper aims to add to the growing body of cognitive translation studies that deal with the translation of emotions and the factors of evaluating the translation process-oriented. Cognitive appraisal is one of the tokens that includes three paradigms of assessing the performance of translation, it can be addressed from the perspective of emotions, intuitions, and individual styles of the SL and the method of transfer into TL. The study hypothesized that translators create a similar emotional charge due to their mental capability to build the same emotional effect in the TL audience. The study also proposed that the applicability of cognitive appraisal is a valuable method of evaluating the translation process, as pertinent to TPR. The
... Show MoreThe present work was done in an attempt to build systematic procedures for treating warts by 810 nm diode laser regarding dose parameters, application parameters and laser safety. The study was done in Al- Kindy Teaching Hospital in Baghdad, Iraq during the period from 1st October 2003 till 1st April 2004. Fifteen patients completed the treatment and they were followed for the period of 3 months. Recalcitrant and extensive warts were selected for the study. Patients were randomly divided into 3 groups to be treated by different laser powers 9, 12 and 15 W, power density of 286 W/cm2, 381W/cm2, 477 W/cm2 pulse duration of 0.2 s, interval of 0.2 s and repeated pulses were used. The mode of application was either circular or radial. Pain oc
... Show Moremajor goal of the next-generation wireless communication systems is the development of a reliable high-speed wireless communication system that supports high user mobility. They must focus on increasing the link throughput and the network capacity. In this paper a novel, spectral efficient system is proposed for generating and transmitting twodimensional (2-D) orthogonal frequency division multiplexing (OFDM) symbols through 2- D inter-symbol interference (ISI) channel. Instead of conventional data mapping techniques, discrete finite Radon transform (FRAT) is used as a data mapping technique due to the increased orthogonality offered. As a result, the proposed structure gives a significant improvement in bit error rate (BER) performance. Th
... Show MoreIn recent days, the escalating need to seamlessly transfer data traffic without discontinuities across the Internet network has exerted immense pressure on the capacity of these networks. Consequently, this surge in demand has resulted in the disruption of traffic flow continuity. Despite the emergence of intelligent networking technologies such as software-defined networking, network cloudification, and network function virtualization, they still need to improve their performance. Our proposal provides a novel solution to tackle traffic flow continuity by controlling the selected packet header bits (Differentiated Services Code Point (DSCP)) that govern the traffic flow priority. By setting the DSCP bits, we can determine the appropriate p
... Show More......
The Iraqi government seeks to overcome the financial crisis by investing and privatizing some projects to achieve sustainable growth. Most of the investment projects in Iraq suffer from many constraints that greatly impact the success of these projects. A survey of the opinions of a group of experts was conducted to identify the most important constraints facing the investment process in Iraq. Then the experts' answers were arranged in a closed questionnaire and distributed to the research sample for which the statistical analysis was conducted. Through it, the most important (17) factors that had the greatest impact on the failure of investment projects in Iraq were reached. One of the main constraints was
... Show MoreTeen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC
... Show More