Preferred Language
Articles
/
joe-3041
SIMULATION MODEL FOR THE ASSESSMENT OF DIRECT AND INDIRECT GEOREFERENCING TECHNIQUES IN ANALYTICAL PHOTOGRAMMETRY
...Show More Authors

This paper compares between the direct and indirect georeferencing techniques in Photogrammetry bases on a simulation model. A flight plan is designed which consists of three strips with nine overlapped images for each strip by a (Canon 500D) digital camera with a resolution of 15 Mega Pixels.

 

The triangulation computations are carried out by using (ERDAS LPS) software, and the direct measurements are taken directly on the simulated model to substitute using GPS/INS in real case. Two computational tests have been implemented to evaluate the positional accuracy for the whole model and the Root Mean Square Error (RMSE) relating to (30) check points show that the indirect georeferencing is more accurate than the direct georeferencing. The computed RMSE of indirect georeferencing technique are (±0.0686 m., ± 0.0402 m.±, 0.3583 m.) in (X, Y, Z) respectively, while by direct georeferencing technique are (±0.1274 m., ± 0.1220 m., ± 0.5132 m.) in (X, Y, Z) respectively. Finally, the aim of this paper can be summarized as investigating the possibilities of using a simulation model to evaluate the applicability of direct and indirect georeferencing and analyzing the accuracy of both techniques.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 31 2023
Journal Name
Iraqi Geological Journal
A Survey of Infill Well Location Optimization Techniques
...Show More Authors

The maximization of the net present value of the investment in oil field improvements is greatly aided by the optimization of well location, which plays a significant role in the production of oil. However, using of optimization methods in well placement developments is exceedingly difficult since the well placement optimization scenario involves a large number of choice variables, objective functions, and restrictions. In addition, a wide variety of computational approaches, both traditional and unconventional, have been applied in order to maximize the efficiency of well installation operations. This research demonstrates how optimization approaches used in well placement have progressed since the last time they were examined. Fol

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
A Comparison Between Some Estimator Methods of Linear Regression Model With Auto-Correlated Errors With Application Data for the Wheat in Iraq
...Show More Authors

This research a study model of linear regression problem of autocorrelation of random error is spread when a normal distribution as used in linear regression analysis for relationship between variables and through this relationship can predict the value of a variable with the values of other variables, and was comparing methods (method of least squares, method of the average un-weighted, Thiel method and Laplace method) using the mean square error (MSE) boxes and simulation and the study included fore sizes of samples (15, 30, 60, 100). The results showed that the least-squares method is best, applying the fore methods of buckwheat production data and the cultivated area of the provinces of Iraq for years (2010), (2011), (2012),

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Electronic Customer Trust Building Tools On Excellent Performance An analytical study of the opinions of a sample of individuals in the administrative and leadership positions in the Northern Cement Company
...Show More Authors

The current study aims to overcome the conflicts facing the company in its way of staying and continuing to maintain its performance excellent in light of the intense competition, which made it seek to find strong ways and links with its customers through electronic communication using electronic platforms, and this put confidence and safety in The place of suspicion and fear of not fulfilling credibility or violating the privacy, so this research comes to answer about the question:  “Can the company achieve an excellent performance by relying on the customer's electronic confidence?”.

The study followed the descriptive and analytical approaches by providing a virtual model and testing the zero hypotheses, which stipulat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
E3s Web Of Conferences
Assessment of radiological biological risks in samples of medicinal plants in Iraq
...Show More Authors

The aim of this research sought to assess the background radiati on levels of medicinal plant samples in Iraq.The D, AED, and ELCRThe D values are 0.164 ± 0.006 µSv/h.The radiation dose outputs from the afore mentioned research were juxtaposed with the safety threshold of 0.247 µSv/h set by the United Nations Scientific Committee on the Effects of Atomic Radiation (UNSCEAR) in 2008 and the National Council on Radiation Pr otection and Measurements (NCRP) in 2009.The radiation exposure for all samples in this investigation is within the permissible limits.Additionally, t he AED values obtained from microsieverts per hour are (1.31 ±0.0326 mS v/y), indicating variability, with a maximum permissible limit of 2.4 mSv/y ear, as per t

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Sep 06 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques
...Show More Authors

In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco

... Show More
View Publication
Publication Date
Mon May 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Comparison hybrid techniques-based mixed transform using compression and quality metrics
...Show More Authors

Image quality plays a vital role in improving and assessing image compression performance. Image compression represents big image data to a new image with a smaller size suitable for storage and transmission. This paper aims to evaluate the implementation of the hybrid techniques-based tensor product mixed transform. Compression and quality metrics such as compression-ratio (CR), rate-distortion (RD), peak signal-to-noise ratio (PSNR), and Structural Content (SC) are utilized for evaluating the hybrid techniques. Then, a comparison between techniques is achieved according to these metrics to estimate the best technique. The main contribution is to improve the hybrid techniques. The proposed hybrid techniques are consisting of discrete wavel

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Alustath Journal For Human And Social Sciences
Obstacles to the application of electronic management in university libraries: the universities of Baghdad and Al-Mustansiriya as a model.
...Show More Authors

The research aims to identify the obstacles facing the application of electronic management in our university libraries, including the central library of the University of Baghdad and the central library of Al-Mustansiriya University, the research sample, as they are among the main libraries that used electronic technologies in managing some of their work and in providing their services, and they have a website via the Internet. The research relied on the case study method to identify the obstacles by visiting the two libraries, interviewing their managers and employees responsible for the departments, and answering inquiries about the obstacles that prevent the application of electronic management in order to identify them and find appropr

... Show More
Preview PDF
Publication Date
Wed Nov 07 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Nurses' Practices Toward Infection Control Standardized Precautions in Azady Teaching Hospital in the City of Kirkuk
...Show More Authors

Objective: The aim of the present study is to assess the practices of nurses towards standard precautions at Azady
Teaching Hospital in the City of Kirkuk.
Methodology: A descriptive study, which uses the assessment approach and it was conducted on nurses from January
18th, 2009 to September 30th, 2009, using non-probability sampling a purposive sample of (37) subject (male and
female nurses) who worked at surgical wards in Azady Teaching Hospital in Kirkuk city was selected. Two study
instruments were utilized for proper data collection [questionnaire and observational checklist]; a questionnaire was
developed for the purpose of the study. It was comprised of two parts which included the nurses' demographic
characte

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 01 2017
Journal Name
International Journal Of Cardiology
The role of myocardial performance index in assessment of left ventricular function in patients with valvular mitral regurgitation
...Show More Authors

Background: Mitral regurgitation (MR) is the most commonly encountered valve lesion in modern clinical practice. Severe mitral regurgitation may cause systolic dysfunction. Left ventricular ejection fraction may not be an accurate measurement of LV function in patients with mitral insufficiency. Myocardial performance index (MPI) is a simple non invasive measure of myocardial function. Methods: The study involved 50 patients with valvular mitral regurgitation and 50 healthy subjects as a control group. Transthoracic echocardiography was carried out for all patients and control group. The echocardiographic measurements included left ventricular end diastolic and end systolic dimensions, left atrial diameter, ejection fraction (EF), and myoca

... Show More
View Publication
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref