Preferred Language
Articles
/
gBc7CJQBVTCNdQwC4-zf
Making Different Topographic Maps with the Surfer Software Package
...Show More Authors

The main objective of this study is to describe the preparation of topographic maps using the Surfer software. A total of 159 regularly distributed Ground Control Points (GCPs) were collected with the use of the Differential Global Positioning System (DGPS). Seven methods (Contour Map, Post Map, 3D Surface Map, 3D Wireframe Maps, Grid Vector-1 Map, Color Relief Map, and Shaded Relief Maps) at the Surfer environment were used to prepare the topographic maps at the Mukhtar Village near the Al-Fallujah City. Contour lines with other features were superimposed on the DEM layer, which refers to the topography of the terrain inside this study area. The accuracy of the database's results was estimated, essential maps were given, and the results were efficient and effective. The most appropriate method to represent topographic maps was proposed, each of these techniques has been enough to provide us with a general understanding of the subject area.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 16 2021
Journal Name
Cognitive Computation
Deep Transfer Learning for Improved Detection of Keratoconus using Corneal Topographic Maps
...Show More Authors
Abstract <p>Clinical keratoconus (KCN) detection is a challenging and time-consuming task. In the diagnosis process, ophthalmologists must revise demographic and clinical ophthalmic examinations. The latter include slit-lamb, corneal topographic maps, and Pentacam indices (PI). We propose an Ensemble of Deep Transfer Learning (EDTL) based on corneal topographic maps. We consider four pretrained networks, SqueezeNet (SqN), AlexNet (AN), ShuffleNet (SfN), and MobileNet-v2 (MN), and fine-tune them on a dataset of KCN and normal cases, each including four topographic maps. We also consider a PI classifier. Then, our EDTL method combines the output probabilities of each of the five classifiers to obtain a decision b</p> ... Show More
View Publication
Scopus (23)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Thu Jul 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Review of the Some Fixed Point Theorems for Different Kinds of Maps
...Show More Authors

The focus of this article, reviewed a generalized  of contraction mapping and nonexpansive maps and recall some theorems about the existence and uniqueness of common fixed point and coincidence fixed-point for such maps under some conditions. Moreover, some schemes of different types as one-step schemes ,two-step schemes and three step schemes (Mann scheme algorithm, Ishukawa scheme algorithm, noor scheme algorithm, .scheme algorithm,  scheme algorithm Modified  scheme algorithm arahan scheme algorithm and others. The convergence of these schemes has been studied .On the other hands, We also reviewed the convergence, valence and stability theories of different types of near-plots in convex metric space.

View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Plant Archives
Assessment of organic carbon content in different topographic from northern Iraq using remote sensing technique and GIS
...Show More Authors

Scopus (1)
Scopus
Publication Date
Tue Feb 13 2024
Journal Name
Iraqi Journal Of Science
Bimodal Transitive Maps with Zero Topological Entropy
...Show More Authors

Our goal in this work is to describe the structure of a class of bimodal self maps on the compact real interval I with zero topological entropy and transitive.

View Publication Preview PDF
Publication Date
Wed Dec 27 2017
Journal Name
Al-khwarizmi Engineering Journal
Human Face Recognition Using GABOR Filter And Different Self Organizing Maps Neural Networks
...Show More Authors

 

This work implements the face recognition system based on two stages, the first stage is feature extraction stage and the second stage is the classification stage. The feature extraction stage consists of Self-Organizing Maps (SOM) in a hierarchical format in conjunction with Gabor Filters and local image sampling. Different types of SOM’s were used and a comparison between the results from these SOM’s was given.

The next stage is the classification stage, and consists of self-organizing map neural network; the goal of this stage is to find the similar image to the input image. The proposal method algorithm implemented by using C++ packages, this work is successful classifier for a face database consist of 20

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Software Security using Aspect-Oriented Software Development
...Show More Authors

Aspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.

View Publication Preview PDF
Publication Date
Wed Dec 26 2018
Journal Name
Iraqi Journal Of Science
Design of New Dynamic Cryptosystem with High Software Protection
...Show More Authors

     In this paper a design of new robust and dynamic cryptosystem using stream key generator with good random statistical properties is introduced. The results of the statistical tests, initialization and the components of the proposed generator of the suggested cryptosystem are detailed in [1]. The proposed cryptosystem called Robust and Efficient Dynamic Stream Cipher Cryptosystem (RDSCC). The dynamic here means the generator of RDSCC has unfixed construction; the design will be changed as the seed (initial) key changed. The generator will construct itself by barrows number of Linear Feedback Shift Registers (LFSR’s), randomly, stored in protected bank file. The RDSCC is constructed to be flexibl

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF
Publication Date
Wed May 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
The impact of UAV flight planning parameters on topographic mapping quality control
...Show More Authors
Abstract<p>There is a growing need for up-to-date data for rapid decision making in the modern digital age. Recently, the need for high-resolution topographic maps is highly demanding by most mapping clients. With the maturing automatic structure from mobile and multi-view stereoscopy software, small organizations and individuals now have the ability to make their own surveys based on mobile mapping devices. This study looks at how feasible using low-cost Unmanned Aerial Vehicle (UAV) as a mobile mapping device for photogrammetric topographical surveys. It is showing the impact of different UAV flight settings and parameters on the accuracy of mapping products. An automatic scenario for photogra</p> ... Show More
View Publication
Scopus (8)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Journal Of King Saud University – Science
COMSOL multiphysics 3.5a package for simulating the cadmium transport in the sand bed-bentonite low permeable barrier
...Show More Authors

Scopus (24)
Crossref (22)
Scopus Crossref