Preferred Language
Articles
/
6BdKWZABVTCNdQwCAodc
Optimizing Application of UAV-Based SfM Photogrammetric 3D Mapping in Urban Areas
...Show More Authors

In recent years, the extensive need for high-quality acquisition platforms for various 3D mapping applications has rapidly increased, especially in sensor performance, portability, and low cost. Image-based UAV sensors have overwhelming merits over alternative solutions for their high timeline and resilience data acquisition systems and the high-resolution spatial data they can provide through extensive Computer Vision (CV) data processing approaches. However, applying this technique, including the appropriate selection of flight mission and image acquisition parameters, ground settings and targeting, and Structure from Motion- Multi-View Stereo (SfM-MVS) post-processing, must be optimized to the type of study site and feature characteristics. This research focuses on optimizing the application of UAV-SfM photogrammetry in an urban area on the east bank of the Tigris River in the north region of Iraq following optimized data capturing plan and SfM-MVS photogrammetric workflow. The research presented the practical application of optimized flight planning, data acquisition, image processing, accuracy analysis, and evaluation based on ground truth targets designed for the proposed optimal routine. This includes investigating the influence of the number and distribution of GCPs, flying heights, and processing parameters on the quality of the produced 3D data. The research showed the potential of low-budget and affordable UAV devices to deliver robust 3D products in a relatively short period by demonstrating the value of UAV-based image techniques when contributed to CV algorithms. The results showed powerful outcomes with validation errors reaching a centimeter-level from 100 m flying height when applying the optimized flight plan settings and the appropriate selection of the number and distribution of GCPs. The study established a streamlined UAV mapping procedure, demonstrated the viability of UAV use for 3D mapping applications, offered suggestions for enhancing future applications, and offered clues as to whether or not UAVs could serve as a viable alternative to conventional ground-based surveying techniques in accurate applications.

Scopus Crossref
View Publication
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Application of Finite Element Technique: A Review Study
...Show More Authors

The finite element approach is used to solve a variety of difficulties, including well bore stability, fluid flow production and injection wells, mechanical issues and others. Geomechanics is a term that includes a number of important aspects in the petroleum industry, such as studying the changes that can be occur in oil reservoirs and geological structures, and providing a picture of oil well stability during drilling. The current review study concerned about the advancements in the application of the finite element method (FEM) in the geomechanical field over a course of century.

Firstly, the study presented the early advancements of this method by development the structural framework of stress, make numerical computer solution

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Advances In Intelligent Systems And Computing
Optimal Prediction Using Artificial Intelligence Application
...Show More Authors

View Publication
Scopus (12)
Crossref (11)
Scopus Crossref
Publication Date
Mon Jul 01 2024
Journal Name
International Journal Of Engineering In Computer Science
Human biometric identification: Application and evaluation
...Show More Authors

View Publication
Crossref
Publication Date
Sun Mar 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Security For Three-Tiered Web Application
...Show More Authors

          Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research).  This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 15 2018
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of the effect of local exogenous application of osteopontin on wound healing in rats
...Show More Authors

Background: Wound healing is a complex dynamical interaction between various cell types, the extracellular matrix, cytokines, and growth factors. osteoponetin is a substance that acts as an anti-inflammatory. Aims of study: The study was designed to identify the role of local exogenous applications of osteopontin on wound healing (in cheek skin). Materials and methods: Thirty adult male albino rats weighting an average of (250-300gm) used in this study, incisional wounds were made in the skin of the cheek of rat and they were divided into the following groups: A-Control group: 15 rats treated with 1µ l of normal saline B-Experimental groups: 15 rats treated with topical application of 1µl osteopontin. The scarification of animals we

... Show More
View Publication
Crossref
Publication Date
Sun Jun 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Effect of Microwave Treatment in Graphite Anode for Microbial Fuel Cell and Its Application in Biosensor
...Show More Authors

The electrode in the microbial fuel cell has a significant effect on cell performance. The treatment of the electrode is a crucial step to make the electrode surface more habitable for bacteria growth, thus, increases the power production as well as waste treatment. In the current study, two graphite electrodes were treated by a microwave. The first electrode was treated with 100W microwave energy, while the second one was treated with 600W microwave energy. There is a significant enhancement in the surface of the graphite anode after the pretreatment process. The results show an increase in the power density from 10 mW/m2 to 15 mW/m2 with 100w treatment and to 13.47 mW/m2 with 600w treatment. An organic

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Dec 31 2021
Journal Name
Political Sciences Journal
The application of smart power in the regional power struggle in the Middle East after 2011
...Show More Authors

Receipt date:12/7/2020 accepted date:24/1/2021 Publication date:31/12/2021

 Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 International License.

The constant characteristic of international relations is the constant change due to political, economic and military developments in addition to technology, and this in turn has led to many transformations in the concept of power, its uses, and the elements that form power and its distribution, and according to those variables, the concept of power has shifted from hard to soft, up to smart powe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Sex Variations by Linear Measurements of Palatal Bones and Skull Base Using 3D Reconstructed Computed Tomographic Scan among Iraqi Sample
...Show More Authors

Background: The skull base and the hard palate contain many anatomical features that make them rich in information which are useful in sex differentiation; in addition to that they have the ability to resist the hardest environmental conditions that support them in making sex differentiation. Three dimensional computed tomographic techniques has important role in differentiation between sex since it offers images with very accurate data and details of all anatomical structures with high resolution. This study was made to study sex variations among Iraqi sample by craniometric linear measurements of the hard palate and the skull base using 3D reconstructed Computed Tomographic scan. Materials and methods: This study composed of 100 Iraqi su

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 25 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Using Classification of Brown risks in Evaluation of the internal control system: Application Research in Karbala University
...Show More Authors

Internal control system is a safety valve that preserves economic units assets and ensure the accuracy of financial data, as well as to obligation in the laws, regulations, administrative policies ,and improve the efficiency, effectiveness and economic of operation, so it has become imperative for these units attention to internal and developed control system The research problem in exposure the economic units when the exercise of their business to many of the risks to growth or hinder the achievement of its objectives and the risks (financial, operational, strategy, risk) and not it rely on risk Assessment according to modern scientific methods, as in Brown's risk Classification, Which led to the weakness of the internal control identif

... Show More
View Publication Preview PDF
Crossref