Preferred Language
Articles
/
hxeSapIBVTCNdQwC268d
GNSS positioning techniques for enhancing Google Earth data quality
...Show More Authors

Due to the easily access to the satellite images, Google Earth (GE) images have become more popular than other online virtual globes. However, the popularity of GE is not an indication of its accuracy. A considerable amount of literature has been published on evaluating the positional accuracy of GE data; however there are few studies which have investigated the subject of improving the GE accuracy. In this paper, a practical method for enhancing the horizontal positional accuracy of GE is suggested by establishing ten reference points, in University of Baghdad main campus, using different Global Navigation Satellite System (GNSS) observation techniques: Rapid Static, Post-Processing Kinematic, and Network. Then, the GE image for the study area was captured, saved, and georefrenced based on precise positions for ten selected reference points. The findings of this research indicate that the network method gives the most accurate results than using other two methods. Closer inspection of the results shows that the network method enhanced the results in comparison with the results of Rapid Static and PPK in the east component by 50% and 60%, respectively and in the north component by 18% and 20%, correspondingly.

Publication Date
Thu Sep 15 2022
Journal Name
Al-academy
Production mechanisms and their implications for Iraqi theater techniques
...Show More Authors

Theatrical production mechanisms were determined according to the extents of the theatrical performance, the directing plan, and the ideas that the theatrical performance seeks to convey to the audience. Accordingly, theatrical production mechanisms differ between one theatrical performance and another according to the requirements of each of them and the surrounding circumstances that accompany the production of theatrical performance, and in order to search for production mechanisms and their repercussions on the show. Theatrical The current research was divided into four chapters, namely (Chapter One - Methodology), which identified the research problem in the following question: What are the production mechanisms and their implicatio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Oct 15 2023
Journal Name
Journal Of Yarmouk
Artificial Intelligence Techniques for Colon Cancer Detection: A Review
...Show More Authors

Publication Date
Mon Dec 03 2018
Journal Name
Journal Of Engineering
Error Investigation for Free Form Surfaces in Bezier Techniques
...Show More Authors

Surface modeling utilizing Bezier technique is one of the more important tool in computer aided geometric design (CAD). The aim of this work is to design and implement multi-patches Bezier free-form surface. The technique has an effective contribution in technology domains and in ships, aircrafts, and cars industry, moreover for its wide utilization in making the molds. This work is includes the synthesis of these patches in a method that is allow the participation of these control point for the merge of the patches, and the confluence of patches at similar degree sides due to degree variation per patch.  The model has been implemented to represent the surface. The interior data of the desired surfaces designed by M

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 16 2024
Journal Name
International Journal Of Computing And Digital Systems
Digital Intelligence for University Students Using Artificial Intelligence Techniques
...Show More Authors

The research problem arose from the researchers’ sense of the importance of Digital Intelligence (DI), as it is a basic requirement to help students engage in the digital world and be disciplined in using technology and digital techniques, as students’ ideas are sufficiently susceptible to influence at this stage in light of modern technology. The research aims to determine the level of DI among university students using Artificial Intelligence (AI) techniques. To verify this, the researchers built a measure of DI. The measure in its final form consisted of (24) items distributed among (8) main skills, and the validity and reliability of the tool were confirmed. It was applied to a sample of 139 male and female students who were chosen

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
Two Techniques (Spectrophotometric and Turbidimetric) for Determination of Ciprofloxacin HCl in Pharmaceutical Drugs with Comparison between the Techniques
...Show More Authors

A new, effective, simple and inexpensive method was developed for determination the amounts of Ciprofloxacin HCl in solutions and in tablets by spectrophotometry and turbidity using sodium tungstate as reagent. Also, in this paper comparison between two techniques was conducted. The reaction between the Ciprofloxacin HCl and reagent in acidic media formed a yellowish white complex. Chemical and physical conditions have been investigated. The Linear range for spectroscopic and turbidimetric techniques were (0.05-1.25) and (0.05-3.0) mmol.L-1 with correlation coefficients (0.9956) and (0.9941) respectively. The limits of detection were 7×10-5 and 5×10-5 mol.L-1. The proposed method is good alternative for determination of Ciprofloxacin H

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Engineering
Quality Assurance for Iraqi Bottled Water Specifications
...Show More Authors

In this research the specifications of Iraqi drinking bottled water brands are investigated throughout the comparison between local brands, Saudi Arabia and the World Health Organization (WHO) for bottled water standard specifications. These specifications were also compared to that of Iraqi Tap Water standards. To reveal variations in the specifications for Iraqi bottled water,  and above mentioned standards some quality control tools are conducted for more than 33% of different bottled water brands (of different origins such as spring, purified,..etc) in Iraq by investigating the  selected quality parameters registered on their marketing labels. Results employing Minitab software (ver. 16) to generate X bar,

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Computers And Electronics In Agriculture
Meteorological data mining and hybrid data-intelligence models for reference evaporation simulation: A case study in Iraq
...Show More Authors

View Publication
Crossref (108)
Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
A Smishing Detection Method Based on SMS Contents Analysis and URL Inspection Using Google Engine and VirusTotal
...Show More Authors

    Smishing is the delivery of phishing content to mobile users via a short message service (SMS). SMS allows cybercriminals to reach out to mobile end users in a new way, attempting to deliver phishing messages, mobile malware, and online scams that appear to be from a trusted brand. This paper proposes a new method for detecting smishing by combining two detection methods. The first method is uniform resource locators (URL) analysis, which employs a novel combination of the Google engine and VirusTotal. The second method involves examining SMS content to extract efficient features and classify messages as ham or smishing based on keywords contained within them using four well-known classifiers: support vector machine (SVM), random

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Jul 01 2012
Journal Name
Journal Of Engineering
Preparation of Design Charts for Estimation of the Length of an Upstream Impervious Blanket in a Homogenous Earth Dam
...Show More Authors