Digital Elevation Model (DEM) is one of the developed techniques for relief representation. The definition of a DEM construction is the modeling technique of earth surface from existing data. DEM plays a role as one of the fundamental information requirement that has been generally utilized in GIS data structures. The main aim of this research is to present a methodology for assessing DEMs generation methods. The DEMs data will be extracted from open source data e.g. Google Earth. The tested data will be compared with data produced from formal institutions such as General Directorate of Surveying. The study area has been chosen in south of Iraq (Al-Gharraf / Dhi Qar governorate. The methods of DEMs creation are kriging, IDW (inverse distance weight), spline, and natural neighbor. This research used different software for processing and analysis such as ArcGIS 10.2, TCX and Civil 3D. Two- sample t-test has been adopted to investigate the mean of elevation differences between compared datasets. The results showed that the spline is the best method that can be used to build DEM in this study area.
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreAn experimental study on a KIA pride (SAIPA 131) car model with scale of 1:14 in the wind tunnel was made beside the real car tests. Some of the modifications to passive flow control which are (vortex generator, spoiler and slice diffuser) were added to the car to reduce the drag force which its undesirable characteristic that increase fuel consumption and exhaust toxic gases. Two types of calculations were used to determine the drag force acting on the car body. Firstly, is by the integrating the values of pressure recorded along the pressure taps (for the wind tunnel and the real car testing), secondly, is by using one component balance device (wind tunnel testing) to measure the force. The results show that, the avera
... Show MoreAn experimental study on a KIA pride (SAIPA 131) car model with scale of 1:14 in the wind tunnel was made beside the real car tests. Some of the modifications to passive flow control which are (vortex generator, spoiler and slice diffuser) were added to the car to reduce the drag force which its undesirable characteristic that increase fuel consumption and exhaust toxic gases. Two types of calculations were used to determine the drag force acting on the car body. Firstly, is by the integrating the values of pressure recorded along the pressure taps (for the wind tunnel and the real car testing), secondly, is by using one component balance device (wind tunnel testing) to measure the force. The results show that, the average drag estimated on
... Show MoreBackground: Ankylosing spondylitis is a chronic inflammatory disease that mostly involves the spine and sacroiliac joints. It is associated with a decreased quality of life. Biological medicines such as infliximab and its biosimilar are the mainstay treatments for active ankylosing spondylitis.
Objective: The study objective was to conduct a pharmacoeconomic study comparing the cost-effectiveness of the reference infliximab with its biosimilar in ankylosing spondylitis patients visiting public hospitals.
Subjects and Method: This is a two-center pharmacoeconomic study performed at two large teaching governmental hospitals in Baghdad, Iraq, which s
... Show MoreThe security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreIn this work, the effect of aluminum (Al) dust particles on the DC discharge plasma properties in argon was investigated. A magnetron is placed behind the cathode at different pressures and with varying amounts of Al. The plasma temperature (Te) and density (ne) were calculated using the Boltzmann equation and Stark broadening phenomena, which are considered the most important plasma variables through which the other plasma parameters were calculated. The measurements showed that the emission intensity decreases with increasing pressure from 0.06 to 0.4 Torr, and it slightly decreases with the addition of the NPs. The calculations showed that the ne increased and Te decreased with pressure. Both Te and ne were reduced by increasing
... Show MoreBackground: The rhizome of ginger is used in cooking and for medicinal purposes such as anti-bacterial, anti-fungal, anti-inflammatory and antioxidant. The aims of the study were to test the effect of ethanolic extract of ginger on growth, adherence and acidogenicity of mutans streptococci in comparison to chlorhexidine gluconate 0.2% and de-ionized water. Materials and methods: From saliva often volunteers (dental students 20-22 years); mutans streptococci was isolated, purified and diagnosed according to morphological characteristic and biochemical tests. Ginger was powdered and extracted, different concentrations of ginger extract were prepared. Chlorhexidine gluconate 0.2% used as a control positive; while de-ionized water was used as a
... Show MoreMedicines comprising fosfomycin are prescribed for urinary tract infections. These drugs are available for oral use as tromethamine and calcium, while fosfomycin-sodium and disodium are given for intravenous (IV) and intramuscular (IM). Many quantitative analytical methods have been reported to estimate Fosfomycin in blood, urine, plasma, serum, and pharmaceutical dosage formulations. Some techniques were spectrophotometric, mass spectrometry, gas chromatography, high-performance liquid chromatography, and electrochemical methods. Here we perform a rapid narrative review that discusses and comparison between them of various analytical methods for the determination of Fosfomycin-containing drugs.