This research presents a model for surveying networks configuration which is designed and called a Computerized Integrated System for Triangulation Network Modeling (CISTNM). It focuses on the strength of figure as a concept then on estimating the relative error (RE) for the computed side (base line) triangulation element. The CISTNM can compute the maximum elevations of the highest
obstacles of the line of sight, the observational signal tower height, the contribution of each triangulation station with their intervisibility test and analysis. The model is characterized by the flexibility to select either a single figure or a combined figures network option. Each option includes three other implicit options such as: triangles, quadrilaterals, and central-point figures (which is to be subdivided into: triangle; quadrilateral, and pentagon). The model also has the property of the diverse modes of display for the output results; i.e. the results can be displayed in the shape of TwoDimensional (2-D) and Three- Dimensional (3-D) representations. Visual Basic is the software depended as a main core in designing CISTNM to draw the suggested network in 2-D to display the network point positions and formations, and it can be linked with the available software such as ArcMap (GIS). The input data which is used as an application of the targeted geodetic surveying techniques (triangulation) is Chamchamal region as a case study in this research. The area lies in the north of Iraq. The results obtained after this application and verification, have proved that the CISTNM
can perform the required task easily and accurately.
This article aims to explore the importance of estimating the a semiparametric regression function ,where we suggest a new estimator beside the other combined estimators and then we make a comparison among them by using simulation technique . Through the simulation results we find that the suggest estimator is the best with the first and second models ,wherealse for the third model we find Burman and Chaudhuri (B&C) is best.
An automatic text summarization system mimics how humans summarize by picking the most significant sentences in a source text. However, the complexities of the Arabic language have become challenging to obtain information quickly and effectively. The main disadvantage of the traditional approaches is that they are strictly constrained (especially for the Arabic language) by the accuracy of sentence feature functions, weighting schemes, and similarity calculations. On the other hand, the meta-heuristic search approaches have a feature tha
... Show MoreWater saturation is the most significant characteristic for reservoir characterization in order to assess oil reserves; this paper reviewed the concepts and applications of both classic and new approaches to determine water saturation. so, this work guides the reader to realize and distinguish between various strategies to obtain an appropriate water saturation value from electrical logging in both resistivity and dielectric has been studied, and the most well-known models in clean and shaly formation have been demonstrated. The Nuclear Magnetic Resonance in conventional and nonconventional reservoirs has been reviewed and understood as the major feature of this approach to estimate Water Saturation based on T2 distribution. Artific
... Show MoreAs technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show MoreEpithelial mesenchymal transition (EMT) is a process comprising cellular and molecular events which result in cells shifting from an epithelial to a mesenchymal phenotype. Periodontitis is a destructive chronic disease of the periodontium initiated in response to a dysbiotic microbiome, and dominated by Gram-negative bacteria in the subgingival niches accompanied by an aberrant immune response in susceptible subjects. Both EMT and periodontitis share common risk factors and drivers, including Gram-negative bacteria, excess inflammatory cytokine production, smoking, oxidative stress and diabetes mellitus. In addition, periodontitis is characterized by down-regulation of key epithelial markers such as E-cadherin together with up-regulation of
... Show MoreInduced EF is among the most important of advanced oxidation processes (AOPs) It was employed to treat different kinds of wastewater. In the present review, the types and mechanism of induced EF were outlined. Parameters affecting this process have been mentioned with details. These are current density, pH, H2O2 concentration, and time. The application of induced electro Fenton in various sectors of industries like textile, petroleum refineries, and pharmaceutical were outlined. The outcomes of this review demonstrate the vital role of induced EF in treatment of wastewater at high efficiency and low cost in contrast with conventional technique
This work explores the advancement and potential of solar‐powered humidification–dehumidification (HDH) desalination systems, addressing the critical challenge of global water scarcity. Emphasizing solar‐powered humidifiers in HDH systems presents an innovative solution per the urgent demand for sustainable freshwater sources utilizing abundant energy resources. This work reviews various humidifier designs, pointing out their crucial role in the efficiency and yield of HDH desalination units and their operational, maintenance, and scaling issues. Key factors, such as design effectiveness, water‐vapor capacity, and material selection, are assessed to understand their impact on the system's ove
DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show MoreAn impressed current cathodic protection system (ICCP) requires measurements of extremely low-level quantities of its electrical characteristics. The current experimental work utilized the Adafruit INA219 sensor module for acquiring the values for voltage, current, and power of a default load, which consumes quite low power and simulates an ICCP system. The main problem is the adaptation of the INA219 sensor to the LabVIEW environment due to the absence of the library of this sensor. This work is devoted to the adaptation of the Adafruit INA219 sensor module in the LabVIEW environment through creating, developing, and successfully testing a Sub VI to be ready for employment in an ICCP system. The sensor output was monitored with an Ardui
... Show More