Preferred Language
Articles
/
gxcmWZABVTCNdQwC6If0
CALIBRATION OF FULL-WAVEFORM ALS DATA BASED ON ROBUST INCIDENCE ANGLE ESTIMATION
...Show More Authors

Abstract. Full-waveform airborne laser scanning data has shown its potential to enhance available segmentation and classification approaches through the additional information it can provide. However, this additional information is unable to directly provide a valid physical representation of surface features due to many variables affecting the backscattered energy during travel between the sensor and the target. Effectively, this delivers a mis-match between signals from overlapping flightlines. Therefore direct use of this information is not recommended without the adoption of a comprehensive radiometric calibration strategy that accounts for all these effects. This paper presents a practical and reliable radiometric calibration routine by accounting for all the variables affecting the backscattered energy, including the essential factor of angle of incidence. A new robust incidence angle estimation approach has been developed which has proven capable of delivering a reliable estimation for the scattering direction of the individual echoes. The routine was tested and validated both visually and statistically over various land cover types with simple and challenging surface trends. This proved the validity of this approach to deliver the optimal match between overlapping flightlines after calibration, particularly by adopting a parameter which accounts for the angle of incidence effect.

Crossref
View Publication
Publication Date
Sun Dec 03 2023
Journal Name
2023 Ieee International Conference On Energy Technologies For Future Grids (etfg)
Optimal Hybrid Type-2 Fuzzy-PID Controller for Blade Pitch Angle in Horizontal-axis Wind Turbines
...Show More Authors

In the modern world, wind turbine (WT) has become the largest source of renewable energy. The horizontal-axis wind turbine (HAWT) has higher efficiency than the vertical-axis wind turbine (VAWT). The blade pitch angle (BPA) of WT is controlled to increase output power generation over the rated wind speed. This paper proposes an accurate controller for BPA in a 500-kw HAWT. Three types of controllers have been applied and compared to find the best controller: PID controller (PIDC), fuzzy logic type-2 controller (T2FLC), and hybrid type-2 fuzzy-PID controller (T2FPIDC). This paper has been used Mamdani and Sugeno fuzzy inference systems (FIS) to find the best inference system for WT controllers. Furthermore, genetic algorithm (GA) and particl

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jul 24 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
The Incidence of Hepatitis C Virus Infections among People Screened in Governmental Health Care Facilities in 2018 in Iraq
...Show More Authors

View Publication
Crossref
Publication Date
Sun Dec 05 2010
Journal Name
Baghdad Science Journal
Study the incidence of Candida infection in Diabetic patients submitted to the Balad Town Hospital in Salah –Eldeen, Province
...Show More Authors

This study was done at Al-Balad City Hospital on 60 diabetic patients (25 male and 35 female). The study included Fasting Blood Sugar and fungal diagnosis (systemic and superficial fungus). The results showed that the high concentration of blood sugar belonged to the group > 70 years among the diabetic patients with high significant differences in comparison with other groups P<0.001 . The result showed that percentage of female systemic fungus infection was higher than male systemic fungus infection ( female 63% and male 24%) and vice versa about superficial fungus infection (female 37% and male 76%) . Data showed that the percentage of nail fungus infection among female diabetic patients was higher than the percentage of male diabetic p

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jul 24 2020
Journal Name
Indian Journal Of Forensic Medicine &amp; Toxicology
The Incidence of Hepatitis C Virus Infections among People Screened in Governmental Health Care Facilities in 2018 in Iraq
...Show More Authors

View Publication
Crossref
Publication Date
Tue Mar 28 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
The Relationship between ABO Blood Group Distribution and the incidence of Upper Gastric and Duodenal Ulcer in Iraqi Patients
...Show More Authors

The relationship between blood group antigens and peptic ulcer disease has been widely evaluated in the past, but only one study relating H pylori seroprevalence to ABO blood groups among Iraqi patients with peptic ulcer disease is available. We aimed to evaluate the frequency of peptic ulcer disease among different ABO blood groups in Iraqi patients, and we thought it was worthwhile to try to determine whether these components take some part in disease etiology. One hundred and six patients with peptic ulcer disease (PUD) (43 male and 63 female; mean  age: 48 ± 18 years) who attended Baghdad teaching hospital and Al- Yarmouk teaching hospital endoscopy centers were enrolled , and 238 control Subjects.  Fing

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Jan 02 2025
Journal Name
Applied Computing And Informatics
WisdomModel: convert data into wisdom
...Show More Authors

Scopus (2)
Scopus
Publication Date
Sun Jun 21 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Evaluation the Incidence of Genotoxic Effects of Artificial Food Favoring Additives in Bone Marrow Cells and Spleen Cells in Mice
...Show More Authors

 

Genetic material is the most important component of cells because it contains the genetic information; hence any disruption to the structure chromosome of cells could lead to very bad results. Genotoxicity use to evaluate the safety of any chemical compounds on genetic materials. Artificial food flavoring additive are chemical substances to produce specific placebo effects added to foods but impart specific flavor to it.

The present study evaluates the genotoxic effect of artificial food flavoring additive on structure of chromosomes at three different concentrations (50%, 100%and 150%) on both bone marrow cells and spleen cells in mice for fourteen successive days. It was found that artificial food flavoring addit

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Hybrid LDPC-STBC communications system based on chaos
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image
...Show More Authors

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF