Preferred Language
Articles
/
joe-209
Accuracy Evaluation of Digital Elevation Model Created Using Handheld Global Positioning System Receivers
...Show More Authors

This study aims to assess the accuracy of digital elevation model (DEM) created with utilization of handheld Global Positioning System (GPS) and comparing with Advanced Spaceborne Thermal Emission and Reflection Radiometer Global Digital Elevation Model (ASTER GDEM), version 2. It is known that the quality of the DEM is affected by both of accuracy of elevation at each pixel (absolute accuracy) and accuracy of presented morphology (relative accuracy). The University of Baghdad, Al Jadriya campus was selected as a study area to create and analysis the resulting DEM. Additionally, Geographic Information System (GIS) was used to visualize, analyses and interpolate GPS track points (elevation data) of the study area. In this research, three additional DEMs were created using 60%, 30% and 15% of the all GPS track points to deduce the effect of the number of the included points on the accuracy of the resulting DEM. The study findings show a high resolution for the resulting DEM less than 5m when taking into consideration all GPS tracking points that observed in this research. Moreover, the resulting DEM has relative accuracy better than absolute accuracy and reaches to around 2m. By comparing with ground control points (reference points), the quality of handheld GPS DEM shows considerable improvement better than ASTER GDEM. Thus, this study indicates to improve the accuracy level of handheld GPS DEM by about 40% with increasing the observed number of GPS track points to twice.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Aug 02 2024
Journal Name
Quantum Studies: Mathematics And Foundations
Implementation of a modified noise-free and noisy multistage quantum cryptography protocol using QISKIT
...Show More Authors

Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Science
Investigation of Ground Density Distributions and Charge Form Factors for 14,16,18,20,22N using Cosh Potential
...Show More Authors

     The bound radial wave functions of Cosh potential which are the solutions to the radial part of Schrodinger equation are solved numerically and used to compute the size radii; i.e., the root-mean square proton, neutron, charge and matter radii, ground density distributions and elastic electron scattering charge form factors for nitrogen isotopes 14,16,18,20,22N. The parameters of such potential for the isotopes under study have been opted so as to regenerate the experimental last single nucleon binding energies on Fermi's level and available experimental size radii as well.

View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jun 23 2022
Journal Name
American Scientific Research Journal For Engineering, Technology, And Sciences
A Review of TCP Congestion Control Using Artificial Intelligence in 4G and 5G Networks
...Show More Authors

In recent years, the field of research around the congestion problem of 4G and 5G networks has grown, especially those based on artificial intelligence (AI). Although 4G with LTE is seen as a mature technology, there is a continuous improvement in the infrastructure that led to the emergence of 5G networks. As a result of the large services provided in industries, Internet of Things (IoT) applications and smart cities, which have a large amount of exchanged data, a large number of connected devices per area, and high data rates, have brought their own problems and challenges, especially the problem of congestion. In this context, artificial intelligence (AI) models can be considered as one of the main techniques that can be used to solve ne

... Show More
View Publication
Publication Date
Sun Mar 01 2020
Journal Name
Iraqi Journal Of Physics
Blood Vessels Detection of Diabetic Retinopathy from Retinal Fundus Image using Image Processing Techniques
...Show More Authors

 

Early detection of eye diseases can forestall visual deficiency and vision loss. There are several types of human eye diseases, for example, diabetic retinopathy, glaucoma, arteriosclerosis, and hypertension. Diabetic retinopathy (DR) which is brought about by diabetes causes the retinal vessels harmed and blood leakage in the retina. Retinal blood vessels have a huge job in the detection and treatment of different retinal diseases. Thus, retinal vasculature extraction is significant to help experts for the finding and treatment of systematic diseases. Accordingly, early detection and consequent treatment are fundamental for influenced patients to protect their vision. The aim of this paper is to detect blood vessels from

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Test Engineering & Management
Strengthening of non-liner finite element RCMD Beam with Large Square Opening Using CFRP
...Show More Authors

Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Comparative Study of Image Denoising Using Wavelet Transforms and Optimal Threshold and Neighbouring Window
...Show More Authors

NeighShrink is an efficient image denoising algorithm based on the discrete wavelet
transform (DWT). Its disadvantage is to use a suboptimal universal threshold and identical
neighbouring window size in all wavelet subbands. Dengwen and Wengang proposed an
improved method, which can determine an optimal threshold and neighbouring window size
for every subband by the Stein’s unbiased risk estimate (SURE). Its denoising performance is
considerably superior to NeighShrink and also outperforms SURE-LET, which is an up-todate
denoising algorithm based on the SURE. In this paper different wavelet transform
families are used with this improved method, the results show that Haar wavelet has the
lowest performance among

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Reducing the Mutual Coupling of Cylindrical Circular Microstrip Antennas (CCMAs) Array Using EBG Structure
...Show More Authors

A theoretical study to design a conformal microstrip antennas was introduced in this work. Conformal microstrip antennas define antennas which can be conformed to a certain shape or to any curved surface. It is used in high-speed trains, aircraft, defense and navigation systems, landing gear and various communications systems, as well as in body wearable. Conformal antennas have some advantages such as a wider-angle coverage compared to flat antennas and low radar cross-sectional (RCS) and they are suitable for using in Radome. The main disadvantage of these antennas is the narrow bandwidth. The FDTD method is extremely useful in simulating complicated structures because it allows for direct integration of Maxwell's equations depending o

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Engineering
Estimation and Improvement of Routing Protocol Mobile Ad-Hoc Network Using Fuzzy Neural Network
...Show More Authors

Ad-Hoc Networks are a generation of networks that are truly wireless, and can be easily constructed without any operator. There are protocols for management of these networks, in which the effectiveness and the important elements in these networks are the Quality of Service (QoS). In this work the evaluation of QoS performance of MANETs is done by comparing the results of using AODV, DSR, OLSR and TORA routing protocols using the Op-Net Modeler, then conduct an extensive set of performance experiments for these protocols with a wide variety of settings. The results show that the best protocol depends on QoS using two types of applications (+ve and –ve QoS in the FIS evaluation). QoS of the protocol varies from one prot

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Journal Of Engineering
Identify and Diagnose the Causes of Financial Funding using the Root Cause Analysis Technique
...Show More Authors

The analysis of the root cause techniques is a reasonable option to be made to assess the root causes of the funding of construction projects. There are a variety of issues related to financing in construction industries in Iraq. The root,cause analysis is the impact of security and social conditions on financial funding. Variety tools of root cause analysis have originated from literature, as common methods for the detection of root causes. The purpose of this study was to identify and diagnose causes that lead to obstruction of financial funding in the construction projects in the republic of Iraq from the contractors' point of view and their interaction with a number of variables. The study diagnosed nine causes of fi

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jun 15 2018
Journal Name
Journal Of Baghdad College Of Dentistry
Relation of Gonial Angle Index to osteoporosis and age using CBCT in female subjects
...Show More Authors