The OpenStreetMap (OSM) project aims to establish a free geospatial database for the entire world which is editable by international volunteers. The OSM database contains a wide range of different types of geographical data and characteristics, including highways, buildings, and land use regions. The varying scientific backgrounds of the volunteers can affect the quality of the spatial data that is produced and shared on the internet as an OSM dataset. This study aims to compare the completeness and attribute accuracy of the OSM road networks with the data supplied by a digitizing process for areas in the Baghdad and Thi-Qar governorates. The analyses are primarily based on calculating the portion of the commission (extr
... Show MoreThe OpenStreetMap (OSM) project aims to establish a free geospatial database for the entire world which is editable by international volunteers. The OSM database contains a wide range of different types of geographical data and characteristics, including highways, buildings, and land use regions. The varying scientific backgrounds of the volunteers can affect the quality of the spatial data that is produced and shared on the internet as an OSM dataset. This study aims to compare the completeness and attribute accuracy of the OSM road networks with the data supplied by a digitizing process for areas in the Baghdad and Thi-Qar governorates. The analyses are primarily based on calculating the portion of the commission (extra road) and
... Show MoreThe tensions and crises and the psychological pressure as well as the rapid changes and great development which is taking place in the present time. And witnessing community of wars and conflicts that give rise to future concern among members of the community in general and students in particular, as it included the current research a number of chapters, the First chapter contains the research problem, the important goal, then set researcher terminology that has defined and contained in the title of research in the form (concern the future, artistic expression, middle school). The Second chapter included three sections, the first included the nature of adolescence and traits, characteristics and pr
... Show MoreThis report explores emerging techniques to boost multimedia transfer effectiveness, given the escalating need for improved quality and performance in multimedia interactions. The analysis involves a thorough literature assessment and comparison of present strategies to pinpoint key tendencies and propose novel approaches. The methodology involves examining recent technological enhance ments in video coding standards, quality appraisal methods, and compression tech niques. Specific domains investigated comprise firmware component architectures, 4D indexing structures, and iterative filtering frameworks. The study in addition weighs tradeoffs between video quality, encoding intricacy, and bitrate demands. Key determinations consist of
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreAfter 2003, Iraq witnessed new challenges represented by the predominance of sectarian discourses, hatred and extremism at the expense of moderate political discourse and the predominance of sub-affiliations and external agendas at the expense of national affiliation, which led to the creation of an unsafe or stable environment dominated by the character of violence and terrorism. Moderate discourse would work to fuse sub-affiliations into one melting pot in which it would be the first loyalty to the homeland and not to the tribe, party or sect... Etc., and this in turn will contribute to promoting peaceful coexistence between the various other sub-affiliations within the framework of one community construction
The population has been trying to use clean energy instead of combustion. The choice was to use liquefied petroleum gas (LPG) for domestic use, especially for cooking due to its advantages as a light gas, a lower cost, and clean energy. Residential complexes are supplied with liquefied petroleum gas for each housing unit, transported by pipes from LPG tanks to the equipment. This research aims to simulate the design and performance design of the LPG system in the building that is applied to a residential complex in Baghdad taken as a study case with eight buildings. The building has 11 floors, and each floor has four apartments. The design in this study has been done in two parts, part one is the design of an LPG system for one building, an
... Show MoreAbstract
In this work, two algorithms of Metaheuristic algorithms were hybridized. The first is Invasive Weed Optimization algorithm (IWO) it is a numerical stochastic optimization algorithm and the second is Whale Optimization Algorithm (WOA) it is an algorithm based on the intelligence of swarms and community intelligence. Invasive Weed Optimization Algorithm (IWO) is an algorithm inspired by nature and specifically from the colonizing weeds behavior of weeds, first proposed in 2006 by Mehrabian and Lucas. Due to their strength and adaptability, weeds pose a serious threat to cultivated plants, making them a threat to the cultivation process. The behavior of these weeds has been simulated and used in Invas
... Show MoreIn this paper, a new hybrid algorithm for linear programming model based on Aggregate production planning problems is proposed. The new hybrid algorithm of a simulated annealing (SA) and particle swarm optimization (PSO) algorithms. PSO algorithm employed for a good balance between exploration and exploitation in SA in order to be effective and efficient (speed and quality) for solving linear programming model. Finding results show that the proposed approach is achieving within a reasonable computational time comparing with PSO and SA algorithms.