Preferred Language
Articles
/
joe-460
Digital Orthophoto Production Using Close-Range Photographs for High Curved Objects
...Show More Authors

Orthophoto provides a significant alternative capability for the presentation of architectural or archaeological applications. Although orthophoto production from airphotography of high or lower altitudes is considered to be typical, the close range applications for the large-scale survey of statue or art masterpiece or any kind of monuments still contain a lot of interesting issues to be investigated.

In this paper a test was carried out for the production of large scale orthophoto of highly curved surface, using a statue constructed of some kind of stones. In this test we use stereo photographs to produce the orthophoto in stead of single photo and DTM, by applying the DLT mathematical relationship as base formula in differential rectification process. The possibilities and the restrictions of the used programs for the extraction of digital surface model & orthophoto production were investigated. The accuracy of the adjusted images using the digital differential rectification package, are checked using 3 check points and the RMSE was computed in 3-dimensions. Conclusions for usefulness and reliability of this test for such special applications were derived.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 30 2018
Journal Name
Baghdad Science Journal
Electronic Structure of Copper Antimony Using Compton Scattering Technique
...Show More Authors

In this paper we present the first ever measured experimental electron momentum density of Cu2Sb at an intermediate resolution (0.6 a.u.) using 59.54 keV 241Am Compton spectrometer. The measurements are compared with the theoretical Compton profiles using density function theory (DFT) within a linear combination of an atomic orbitals (LCAO) method. In DFT calculation, Perdew-Burke-Ernzerhof (PBE) scheme is employed to treat correlation whereas exchange is included by following the Becke scheme. It is seen that various approximations within LCAO-DFT show relatively better agreement with the experimental Compton data. Ionic model calculations for a number of configurations (Cu+x/2)2(Sb-x) (0.0≤x≤2.0) are also performed utilizing free a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Scheduling projects using dynamic programming style and smart algorithm
...Show More Authors

The aim of this research is to compare traditional and modern methods to obtain the optimal solution using dynamic programming and intelligent algorithms to solve the problems of project management.

It shows the possible ways in which these problems can be addressed, drawing on a schedule of interrelated and sequential activities And clarifies the relationships between the activities to determine the beginning and end of each activity and determine the duration and cost of the total project and estimate the times used by each activity and determine the objectives sought by the project through planning, implementation and monitoring to maintain the budget assessed 

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Disadvantages of using Nano-particles as fertilizers in Iraq
...Show More Authors
Abstract<p>The agriculture around the world faced many difficulties and the important was to reduce inputs of chemical fertilizers and pesticides and increase the total yield specially with the continuous grow of populations numbers at the world expected to reach more than 9 billion by 2050. In other hand there are other problems which make the challenges bigger such as wars, biotic and abiotic stress, and diseases. The scientists tried to find solutions by using Nano-fertilization which consider a modern way to quickly grow up the yield and decrease use the chemicals. The use of nanotechnology may be destructive on human and the environment due to fast accumulation in the tissues of alive bodie</p> ... Show More
View Publication
Scopus (10)
Crossref (6)
Scopus Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
SPEECH RECOGNITION OF ARABIC WORDS USING ARTIFICIAL NEURAL NETWORKS
...Show More Authors

The speech recognition system has been widely used by many researchers using different
methods to fulfill a fast and accurate system. Speech signal recognition is a typical
classification problem, which generally includes two main parts: feature extraction and
classification. In this paper, a new approach to achieve speech recognition task is proposed by
using transformation techniques for feature extraction methods; namely, slantlet transform
(SLT), discrete wavelet transforms (DWT) type Daubechies Db1 and Db4. Furthermore, a
modified artificial neural network (ANN) with dynamic time warping (DTW) algorithm is
developed to train a speech recognition system to be used for classification and recognition
purposes. T

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Solid State Technology
Durability Of Gypsum Soil Treated By Using Polyurethane Polymer
...Show More Authors

Gypseous soils represented one of the most complex salty soils that faced the geotechnical engineers. Structures that built on gypsum soil will undergo unexpected distortions that will eventually contribute to catastrophic failure. The purpose of this article is to understand the durability of gypsum soil against wetting drying cycles after improvement with polyurethane polymer especially investigate the effect of the wetting-drying cycle on collapsibility. The soil was brought from Sawa lake in AL-Muthanna Governorate in Iraq, with gypsum content 65.5%,&nbsp; A set of Odometer tests were performed to determine the collapsibility potential (CP) for treated and untreated gypsum soil.&nbsp; The result shows that adding a different per

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Feb 14 2024
Journal Name
2nd International Conference For Engineering Sciences And Information Technology (esit 2022): Esit2022 Conference Proceedings
Manufacture of wooden furniture paint using pistachio shell waste
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Aug 15 2018
Journal Name
Al-khwarizmi Engineering Journal
Bioremediation of Soil Contaminated with Diesel using Biopile system
...Show More Authors

This study was focused on biotreatment of soil which polluted by petroleum compounds (Diesel) which caused serious environmental problems. One of the most effective and promising ways to treat diesel-contaminated soil is bioremediation. It is a choice that offers the potential to destroy harmful pollutants using biological activity. The capability of mixed bacterial culture was examined to remediate the diesel-contaminated soil in bio piling system. For fast ex-situ treatment of diesel-contaminated soils, the bio pile system was selected. Two pilot scale bio piles (25 kg soil each) were constructed containing soils contaminated with approximately 2140 mg/kg total petroleum hydrocarbons (TPHs). The amended soil:

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More