Preferred Language
Articles
/
joe-282
Semantic Similarity Assessment of Volunteered Geographic Information

The recent development in communication technologies between individuals allows for the establishment of more informal collaborative map data projects which are called volunteered geographic information (VGI). These projects, such as OpenStreetMap (OSM) project, seek to create free alternative maps which let users add or input new materials to the data of others. The information of different VGI data sources is often not compliant to any standard and each organization is producing a dataset at various level of richness. In this research the assessment of semantic data quality provided by web sources, e.g. OSM will depend on a comparison with the information from standard sources. This will include the validity of semantic accuracy as one of the most important parameter of spatial data quality parameters. Semantic similarity testing covered feature classification, in effect comparing possible categories (legend classes) and actual attributes attached to features. This will be achieved by developing a tool, using Matlab programming language, for analysing and examining OSM semantic accuracy. To identify the strength of semantic accuracy assessment strategy, there are many factors should be considered. For instance, the confusion matrix of feature classifications can be assessed, and different statistical tests should be passed. The results revealed good semantic accuracy of OSM datasets.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Computer Literacy with Skills of Seeking for Information Electronically among University Students

Computer literacy is an urgent necessity for university students, given the rapid development in the means of communication in which we live in this era, and the flow of abundant information. Mainly on the computer in all administrative and academic transactions, where first of all the registration for the semester is done through the computer. Computer culture has many characteristics and advantages that distinguish it from other sciences, including the concept of computer culture that cannot be defined absolutely, and it is difficult to define its levels, because the specifications of the computer-educated individual differ from one individual to another, and from time to time also, you find it a luxury in a country What, and you

... Show More
Crossref (2)
Crossref
View Publication
Publication Date
Sat Jul 31 2021
Journal Name
Journal Of Legal Sciences
Fighting the Information Forgery Crime in the Light of the Comparative Laws

Legislation may be often not enough for protecting information, and regulatory strategies are insufficient as well. Technical means are not also sufficient in preventing risks threating information whatever their effectiveness is. Thus, the protection is a complex structure consisting of law, regulation strategy and technology. The increasing use of and reliance on computer information systems has highlighted the need for good information system management. Legislative control can have a positive effect on this system by providing deterrence and increasing the public awareness of users about the problem.

Consequently, it is required looking for legislative means at the time in which the fight is more effective against this kind o

... Show More
Crossref
View Publication Preview PDF
Publication Date
Thu Aug 31 2023
Journal Name
Eastern-european Journal Of Enterprise Technologies
The influence of information technology (IT) on firm profitability and stock returns

This research study examines the impact of information technology on firm profitability and stock returns. Using a comprehensive dataset of firms across various industries, this research employs rigorous statistical analysis techniques to investigate the relationship between IT investments, firm profitability metrics, and stock returns. The study focuses at how IT investments affect financial performance measures including return on assets (ROA) and return on equity (ROE), with P-values of 0.34 and 0.12, respectively. Furthermore, the study investigates the influence of IT on stock returns, taking into account market capitalization, industry trends, and macroeconomic variables. This study's conclusions center on the beneficial assoc

... Show More
Scopus (17)
Crossref (3)
Scopus Crossref
View Publication
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Induction informational, informational use, the behavior of the product and user information.

Abstract:

This study seeks to shed light on the important processes are linked to the impact of accounting information on the behavior of producer and user of information and are urging informational and informational use. That accounting as a system of accounting information and functions of the delivery of information to decision makers Under behavioral entrance to the formulation of accounting theory should be taken into account Othertlk accounting information in the behavior of the decision maker which requires an explanation of human behavior and predictable.

On the other hand that the accounting information that should be delivered to the decision maker will affect your beha

... Show More
Crossref
View Publication Preview PDF
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Information hiding in digital video using DCT, DWT and CvT

The type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No

... Show More
Scopus (17)
Scopus
Publication Date
Sun Apr 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Information Hiding using LSB Technique based on Developed PSO Algorithm

<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi

... Show More
Scopus (17)
Crossref (3)
Scopus Crossref
View Publication
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Qin Seal Script Character Recognition with Fuzzy and Incomplete Information

The dependable and efficient identification of Qin seal script characters is pivotal in the discovery, preservation, and inheritance of the distinctive cultural values embodied by these artifacts. This paper uses image histograms of oriented gradients (HOG) features and an SVM model to discuss a character recognition model for identifying partial and blurred Qin seal script characters. The model achieves accurate recognition on a small, imbalanced dataset. Firstly, a dataset of Qin seal script image samples is established, and Gaussian filtering is employed to remove image noise. Subsequently, the gamma transformation algorithm adjusts the image brightness and enhances the contrast between font structures and image backgrounds. After a s

... Show More
Scopus (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Wed Jan 13 2021
Journal Name
Iraqi Journal Of Science
Entrepreneurial and Information Systems Universities Applied to Master Students Management

Entrepreneurship, from a few years ago, is considered as a determining factor of the economic performances in the countries sending development. Its structural role and the dynamism it impels in all economies is no more established. For this reason, in this paper we proposed to use a methodology based on entrepreneurial and information systems for management master students in Ibn Zohr University Morocco. This methodology permit to facilitate to create the proper project in different disciplinary fields.
Nowadays, all agents insist on the development of entrepreneurship as well as the creation of enterprises as a catalyst for global economic growth. In this spirit, the development of the culture of business creation among students is

... Show More
Scopus Crossref
View Publication Preview PDF