DEMs, thus, simply regular grids of elevation measurements over the land surface.The aim of the present work is to produce high resolution DEM for certain investigated region (i.e. Baghdad University Campus\ college of science). The easting and northing of 90 locations, including the ground-base and buildings of the studied area, have been obtained by field survey using global positioning system (GPS). The image of the investigated area has been extracted from Quick-Bird satellite sensor (with spatial resolution of 0.6 m). It has been geo-referenced and rectified using 1st order polynomial transformation. many interpolation methods have been used to estimate the elevation such as ordinary Kriging, inverse distance weighted (IDW) and natural neighbor methods. The mosaic algorithm has then been applied between the base and building layers of studied area in order to perform the final DEM. The accuracy assessments of the interpolation methods have been calculated using the root-mean-square-error (RMSE) criterion. Finally, the estimated DEMs have been used to constructing 3-D views of the original image.
The sunrise, sunset, and day length times for Baghdad (Latitude =33.34º N, Longitude =44.43º E) were calculated with high accuracy on a daily basis during 2019. The results showed that the earliest time of sunrise in Baghdad was at 4h: 53m from 5 Jun. to 20 Jun while the latest was at 7h: 07m from 5 Jan. to 11 Jan. The earliest time of sunset in Baghdad was at16 h: 55m from 30 Nov. to 10 Dec. whereas the latest was at 19h: 16m from 25 Jun. to 5 Jul. The minimum period of day length in Baghdad was 9h: 57m) in 17 Dec. whereas the maximum period was 14h: 22m) in 20 Jun. Day length was calculated and compared among regions of different latitudes(0, 15, 30, 45 and 60 north).
Liquefied petroleum gas (LPG), Natural gas (NG) and hydrogen were all used to operate spark ignition internal combustion engine Ricardo E6. A comparison of CO emissions emitted from each case, with emissions emitted from engine fueled with gasoline as a fuel is conducted.
The study was accomplished when engine operated at HUCR for gasoline n(8:1), was compared with its operation at HUCR for each fuel. Compression ratio, equivalence ratio and spark timing were studied at constant speed 1500 rpm.
CO concentrations were little at lean ratios; it appeared to be effected a little with equivalence ratio in this side, at rich side its values became higher, and it appeared to be effected by equivalence ratio highly, the results s
... Show MoreThe research aims to identify the most important variables affecting shooting from jumping high and compare them for the two foot the weak and strong, where the researchers adopted the descriptive method, and the sample was chosen by the intentional method, which consists of (4) players from the Iraqi Sports Army Club, where these variables were studied and their impact on The accuracy of aiming at the two men, and the researchers concluded that most of the players have more accuracy in aiming at the strong leg than at the weak leg, which leads to the loss of many real opportunities during the match because of the players changing the situation or wasting the available opportunity when the position of correction is an opportunity for the w
... Show MoreIn Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
The purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show Morein this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators
A LiF (TLD-700) PTFED disc has adiameter of (13mm) and thickness of (0.4mm) for study the response and sensetivity of this material for gamma and beta rays by using (TOLEDO) system from pitman company. In order to calibrate the system and studying the calibration factor. Discs were irradiated for Gamma and Beta rays and comparing with the theoretical doses. The exposure range is between 15×10-2 mGy to 1000×10-2 mGy. These doses are within the range of normal radiation field for workers.