Preferred Language
Articles
/
joe-342
Development of Spatial Data Infrastructure based on Free Data Integration
...Show More Authors

In recent years, the performance of Spatial Data Infrastructures for governments and companies is a task that has gained ample attention. Different categories of geospatial data such as digital maps, coordinates, web maps, aerial and satellite images, etc., are required to realize the geospatial data components of Spatial Data Infrastructures. In general, there are two distinct types of geospatial data sources exist over the Internet: formal and informal data sources. Despite the growth of informal geospatial data sources, the integration between different free sources is not being achieved effectively. The adoption of this task can be considered the main advantage of this research. This article addresses the research question of how the integration of free geospatial data can be beneficial within domains such as Spatial Data Infrastructures. This was carried out by suggesting a common methodology that uses road networks information such as lengths, centeroids, start and end points, number of nodes and directions to integrate free and open source geospatial datasets. The methodology has been proposed for a particular case study: the use of geospatial data from OpenStreetMap and Google Earth datasets as examples of free data sources. The results revealed possible matching between the roads of OpenStreetMap and Google Earth datasets to serve the development of Spatial Data Infrastructures.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Astronomy & Astrophysics
The spatial extent of polycyclic aromatic hydrocarbons emission in the Herbig star HD 179218
...Show More Authors

Aim. We investigate, in the mid-infrared, the spatial properties of the polycyclic aromatic hydrocarbons (PAHs) emission in the disk of HD 179218, an intermediate-mass Herbig star at ~300 pc.

Methods. We obtained mid-infrared images in the PAH-1, PAH-2 and Si-6 filters centered at 8.6, 11.3, and 12.5 μm, and N-band low-resolution spectra using CanariCam on the 10-m Gran Telescopio Canarias (GTC). We compared the point spread function (PSF) profiles measured in the PAH filters to the profile derived in the Si-6 filter, where the thermal continuum emission dominates. We performed radiative transfer modeling of

... Show More
View Publication
Scopus (12)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Tue Jul 01 2025
Journal Name
Iet Conference Proceedings
Spatial quantile autoregressive model with application to poverty rates in the districts of Iraq
...Show More Authors

This research aims to provide insight into the Spatial Autoregressive Quantile Regression model (SARQR), which is more general than the Spatial Autoregressive model (SAR) and Quantile Regression model (QR) by integrating aspects of both. Since Bayesian approaches may produce reliable estimates of parameter and overcome the problems that standard estimating techniques, hence, in this model (SARQR), they were used to estimate the parameters. Bayesian inference was carried out using Markov Chain Monte Carlo (MCMC) techniques. Several criteria were used in comparison, such as root mean squared error (RMSE), mean absolute percentage error (MAPE), and coefficient of determination (R^2). The application was devoted on dataset of poverty rates acro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
The integration between re-engineering and modern Approaches to reducing costs in the management of change
...Show More Authors

       The entrance process re-engineering one of the main entrances of administrative and technology appropriate to keep pace with scientific progress and the continuing changes in business environment and for the purpose of achieving the goal sought by the organizations in the pursuit of rapid developments and renewable energy in the market competition by changing its operations and activities of the radical change which contributes to an effective contribution to reducing the cost of product or service taking into account the quality improvement in the management of change to keep the increase value and speed of placing on the market to meet customer needs and desires to achieve a

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Dec 16 2018
Journal Name
Al-academy
The Impact of the Use of Piano on the Development of Musical Possibilities of Violinists
...Show More Authors

This research is to take advantage of the performance capabilities which the piano has become famous with and transfer the impact of that advantage to the possibilities of playing the violin. The research aims to introduce the effect of using the piano on the development of the violinists' musical potential. The research, in its literature, focuses on the interpretation of the impact on the possibility of both instruments (piano and violin) in two main sections: the piano (its origin, potential and role in music) and the violin (its origin, potential and role in music). The procedures of the research consisted of presenting a special analysis of a questionnaire consisting of a number of questions presented by the researcher to her resear

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Applied Numerical Mathematics
Multiple time-dependent coefficient identification thermal problems with a free boundary
...Show More Authors

View Publication
Scopus (28)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Sat Jul 28 2018
Journal Name
Journal Of Engineering
GIS Approach for Spatial Distribution Analysis of Groundwater Quality at South-West Part of Basrah
...Show More Authors

Water is necessary for sustainable development and healthy society.  Groundwater, often, is not sufficient and protected for direct human consumption. Due to increase in the density of population the requirement of water is increasing.  In this work, the assessment of groundwater quality was conducted in the south-west part of Basrah province. Spatial variations in the quality of groundwater in the study area have been analyzed utilizing GIS technique. The geochemical parameters of groundwater samples including pH, EC, TDS, Ca, Mg, Na, Cl, HCO3, SO4, and NO3 were assessed in this study. Information maps of the study area have been actually prepared to make use of the GIS spatial

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
The Spatial Poetics and the "Murder of the Real"in Paul Auster's City of Glass*
...Show More Authors

Paul Auster's City of Glass is here singled out as representative of the writer's The New
York Trilogy. All throughout his novelistic career, Auster has been working on a pseudothesis
that adheres to a certain aesthetic of disappearance. The study engages this Austerian
aesthetic apropos of certain theoretical stretches such as the Emersonian "Not Me", the
Thoreauvian "interval" or "nowhere", the Deleuzian "nomadic trajectory", the Derridian
"grammè" or "specter", and the Baudrillardian "disappearance". The city of the novel's titling
is here seen as the trope of all that which has already disappeared, and hence it is seen as the
space (mise en scène) where the perfect crime of the murder of the real is to be thoro

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Planner And Development
Spatial analysis of rural services in the district of Fallujah, Zgharit village, as a model
...Show More Authors

          The study of services in villages is one of the imperative matters that must   be focused on, because it leads to increased attention, which reduces the differences between the countryside and the urban. The extent of its.

  It is well known that community services need to be reached by a person, unlike the anchor services that reach people, here the population distribution plays an important and prominent role in signing these services, so the dispersed distribution pattern and the gathering pattern appeared in the distribution, thus an effect on the time and distance that the person walked to obtain The services are community-based. Therefore

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref