The assessment of data quality from different sources can be considered as a key challenge in supporting effective geospatial data integration and promoting collaboration in mapping projects. This paper presents a methodology for assessing positional and shape quality for authoritative large-scale data, such as Ordnance Survey (OS) UK data and General Directorate for Survey (GDS) Iraq data, and Volunteered Geographic Information (VGI), such as OpenStreetMap (OSM) data, with the intention of assessing possible integration. It is based on the measurement of discrepancies among the datasets, addressing positional accuracy and shape fidelity, using standard procedures and also directional statistics. Line feature comparison has been undertaken using buffering techniques and statistics, whilst shape metrics, including moments invariant, have been applied to assess polygon matching. The analyses are presented with a user-friendly interface which eases data input, computation and output of results, and assists in interpretation of the comparison. The results show that a comparison of positional and shape characteristics of OS data or GDS data, with those of OSM data, indicates that their integration for large scale mapping applications is not viable.
The aim of the study is to examine the challenges of financing small and medium enterprises in Iraq and subsequently to proffer solutions to mitigate problems. These solutions are achieved by focusing on the role of accounting information on the financial projects in for example, hotel construction, and by providing the necessary accounting information for the concerned parties to finance these projects. In order to highlight the challenges associated with the funding of small and medium enterprises and the role of accounting information in reducing those challenges, a questionnaire was prepared. As the government authorities are the ones responsible for the accomplishment of these projects, a questionnaire form was distributed in the proje
... Show MoreAbstract
This research aims to study the reflection of accounting for contingent assets and liabilities and provisions on Faithful Representation characteristic of accounting information, To achieve this goal has been questionnaire design has been distributed to research sample, which consists of (50) li
... Show MoreSlurry-infiltrated fibrous concrete (SIFCON) is a special type of concrete that has great strength, as well as high ductility. However, the unit weight is high, which exceeds the unit weight of fiber-reinforced concrete, because of the high fiber content. This research aims to verify the compressive and flexural strength, as well as the density of SIFCON when using two different fibers (steel and polyolefin). Sometimes mono type of fiber steel or polyolefin, sometimes by hybridizing two types of fiber steel + polyplefin. Volume fraction (6% for all species) was used. Hook-end steel fiber and polyolefin fiber are used. With hybridization, a total volume fraction of 6% was used, which
Background: Central serous chorioretinopathy (CSCR) is an idiopathic condition aggravated by exogenous or endogenous glucocorticoids. Vascular deregulation in the choroid is a new hypothesis regarding central serous chorioretinopathy occurrence. The inhibition of choroidal mineralocorticoid receptors has a great role in shortening the duration of CSCR by inhibiting choroidal vasodilatation and leak.
Objective: To assess the effect of oral spironolactone on subretinal fluid, central macular thickness and visual acuity in patients with acute CSCR compared to observation.
Subjects and Methods: a hospital based, randomized clinical trial carried out at outpatient clinic in Ibn-Alhaitham Teaching E
... Show MoreA resume is the first impression between you and a potential employer. Therefore, the importance of a resume can never be underestimated. Selecting the right candidates for a job within a company can be a daunting task for recruiters when they have to review hundreds of resumes. To reduce time and effort, we can use NLTK and Natural Language Processing (NLP) techniques to extract essential data from a resume. NLTK is a free, open source, community-driven project and the leading platform for building Python programs to work with human language data. To select the best resume according to the company’s requirements, an algorithm such as KNN is used. To be selected from hundreds of resumes, your resume must be one of the best. Theref
... Show More This study includes Estimating scale parameter, location parameter and reliability function for Extreme Value (EXV) distribution by two methods, namely: -
- Maximum Likelihood Method (MLE).
- Probability Weighted Moments Method (PWM).
Used simulations to generate the required samples to estimate the parameters and reliability function of different sizes(n=10,25,50,100) , and give real values for the parameters are and , replicate the simulation experiments (RP=1000)
... Show MoreIn this paper we find the exact solution of Burger's equation after reducing it to Bernoulli equation. We compare this solution with that given by Kaya where he used Adomian decomposition method, the solution given by chakrone where he used the Variation iteration method (VIM)and the solution given by Eq(5)in the paper of M. Javidi. We notice that our solution is better than their solutions.
Fraud Includes acts involving the exercise of deception by multiple parties inside and outside companies in order to obtain economic benefits against the harm to those companies, as they are to commit fraud upon the availability of three factors which represented by the existence of opportunities, motivation, and rationalization. Fraud detecting require necessity of indications the possibility of its existence. Here, Benford’s law can play an important role in direct the light towards the possibility of the existence of financial fraud in the accounting records of the company, which provides the required effort and time for detect fraud and prevent it.
In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show More