Due to the easily access to the satellite images, Google Earth (GE) images have become more popular than other online virtual globes. However, the popularity of GE is not an indication of its accuracy. A considerable amount of literature has been published on evaluating the positional accuracy of GE data; however there are few studies which have investigated the subject of improving the GE accuracy. In this paper, a practical method for enhancing the horizontal positional accuracy of GE is suggested by establishing ten reference points, in University of Baghdad main campus, using different Global Navigation Satellite System (GNSS) observation techniques: Rapid Static, Post-Processing Kinematic, and Network. Then, the GE image for the study area was captured, saved, and georefrenced based on precise positions for ten selected reference points. The findings of this research indicate that the network method gives the most accurate results than using other two methods. Closer inspection of the results shows that the network method enhanced the results in comparison with the results of Rapid Static and PPK in the east component by 50% and 60%, respectively and in the north component by 18% and 20%, correspondingly.
Theatrical production mechanisms were determined according to the extents of the theatrical performance, the directing plan, and the ideas that the theatrical performance seeks to convey to the audience. Accordingly, theatrical production mechanisms differ between one theatrical performance and another according to the requirements of each of them and the surrounding circumstances that accompany the production of theatrical performance, and in order to search for production mechanisms and their repercussions on the show. Theatrical The current research was divided into four chapters, namely (Chapter One - Methodology), which identified the research problem in the following question: What are the production mechanisms and their implicatio
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show MoreSurface modeling utilizing Bezier technique is one of the more important tool in computer aided geometric design (CAD). The aim of this work is to design and implement multi-patches Bezier free-form surface. The technique has an effective contribution in technology domains and in ships, aircrafts, and cars industry, moreover for its wide utilization in making the molds. This work is includes the synthesis of these patches in a method that is allow the participation of these control point for the merge of the patches, and the confluence of patches at similar degree sides due to degree variation per patch. The model has been implemented to represent the surface. The interior data of the desired surfaces designed by M
... Show MoreThe research problem arose from the researchers’ sense of the importance of Digital Intelligence (DI), as it is a basic requirement to help students engage in the digital world and be disciplined in using technology and digital techniques, as students’ ideas are sufficiently susceptible to influence at this stage in light of modern technology. The research aims to determine the level of DI among university students using Artificial Intelligence (AI) techniques. To verify this, the researchers built a measure of DI. The measure in its final form consisted of (24) items distributed among (8) main skills, and the validity and reliability of the tool were confirmed. It was applied to a sample of 139 male and female students who were chosen
... Show MoreA new, effective, simple and inexpensive method was developed for determination the amounts of Ciprofloxacin HCl in solutions and in tablets by spectrophotometry and turbidity using sodium tungstate as reagent. Also, in this paper comparison between two techniques was conducted. The reaction between the Ciprofloxacin HCl and reagent in acidic media formed a yellowish white complex. Chemical and physical conditions have been investigated. The Linear range for spectroscopic and turbidimetric techniques were (0.05-1.25) and (0.05-3.0) mmol.L-1 with correlation coefficients (0.9956) and (0.9941) respectively. The limits of detection were 7×10-5 and 5×10-5 mol.L-1. The proposed method is good alternative for determination of Ciprofloxacin H
... Show MoreIn this research the specifications of Iraqi drinking bottled water brands are investigated throughout the comparison between local brands, Saudi Arabia and the World Health Organization (WHO) for bottled water standard specifications. These specifications were also compared to that of Iraqi Tap Water standards. To reveal variations in the specifications for Iraqi bottled water, and above mentioned standards some quality control tools are conducted for more than 33% of different bottled water brands (of different origins such as spring, purified,..etc) in Iraq by investigating the selected quality parameters registered on their marketing labels. Results employing Minitab software (ver. 16) to generate X bar,
... Show MoreSmishing is the delivery of phishing content to mobile users via a short message service (SMS). SMS allows cybercriminals to reach out to mobile end users in a new way, attempting to deliver phishing messages, mobile malware, and online scams that appear to be from a trusted brand. This paper proposes a new method for detecting smishing by combining two detection methods. The first method is uniform resource locators (URL) analysis, which employs a novel combination of the Google engine and VirusTotal. The second method involves examining SMS content to extract efficient features and classify messages as ham or smishing based on keywords contained within them using four well-known classifiers: support vector machine (SVM), random
... Show More