Global Navigation Satellite System (GNSS) is considered to be one of the most crucial tools for different applications, i.e. transportation, geographic information systems, mobile satellite communications, and others. Without a doubt, the GNSS has been widely employed for different scientific applications, such as land surveying, mapping, and precise monitoring for huge structures, etc. Thus, an intense competitive has appeared between companies which produce geodetic GNSS hardware devices to meet all the requirements of GNSS communities. This study aims to assess the performance of different GNSS receivers to provide reliable positions. In this study, three different receivers, which are produced by different manufacturers, were fixed to form a triangle. Simultaneous observations were made in static mode (2.5 to 3 hours). This observation technique was carried out three times by changing the location of receivers in each time to ensure that three receivers observed each station three times. To evaluate the performance of each receiver, OPUS web-based processing software and TOPCON TOOLS were used to process the raw GNSS observations. The distances between adjacent stations were computed for each observation and compared to standard distances, which were measured using a total station. Furthermore, the internal angles were also computed and compared to those measured by Total Stations. The results showed that some calculated distances are closer to the corresponding distances measured by the total station. This indicates that the receivers involved in the composition of these distances are the most accurate.
The unconventional techniques called “the quick look techniques”, have been developed to present well log data calculations, so that they may be scanned easily to identify the zones that warrant a more detailed analysis, these techniques have been generated by service companies at the well site which are among the useful, they provide the elements of information needed for making decisions quickly when time is of essence. The techniques used in this paper are:
- Apparent resistivity Rwa
- Rxo /Rt
The above two methods had been used to evaluate Nasiriyah oil field formations (well-NS-3) to discover the hydrocarbon bearing formations. A compu
... Show MoreThe current research included (the evaluation of Information Security Management System on according to international standard (ISO / IEC 27001: 2013) in Iraqi Commission for Computers and Informatics), for the development of an administrative system for information security is considered a priority in the present day, and in the light of the organizations dependence on computers and information technology in work and communication with others. The international legitimacy (represented by the International Organization for standardization (ISO)) remains the basis for matching and commitment and the importance of the application of information Security Management System accordi
... Show MoreThe art of batik is one of the ancient arts that has a long history in East Asian countries, especially in Indonesia, where it was considered a traditional craft with which many Indonesian tribes lived. This art began to move to other continents and develops and progresses due to the artist’s connection to the surrounding technological and intellectual development, as art became more outgoing and liberated, it helped the artist to create and innovate in his designs. In this research, he focuses on modern performance methods through which print paintings can be produced through design elements, especially calligraphy, to create aesthetic and creative effects in the productive work. The current research aims to identify the various perfo
... Show MoreThe research dealt with the risks of reinsurance and its impact on the financial performance of the National Insurance Company by focusing on reinsurance in the marine insurance branch. Negative impact on the financial performance of the NICs and the Marine Insurance Branch. The research sample resulted in a main hypothesis that reflects this relationship. Lee in the analysis of financial information reports National Insurance Company of the branch of marine insurance for the period of 2010 until 2017, and the use of (retention) for measuring the re-insurance operations index, and (insurance financial surplus rate) to measure financial performance. For the purpose of obtaining the results, a number of statistical methods were used accord
... Show MoreAbstract Physical requirements are an important priority for the development of football gymnastics coaches because the nature of performance is interconnected and interconnected in terms of the player's duties in the match. In the gameplay situations, the player must perform the skill with strength and speed coupled with accuracy and the reactions of the colleague and competitor alike, which represents the normal reality of the football gymnasium Skilled exercises are one of the most suitable technical side exercises as they are built according to the components of the skill requirements of the game and the nature of its performance, which appear on the gro
... Show MoreSurvival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d
... Show MoreA new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.
This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.
This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance