Preferred Language
Articles
/
joe-639
An Optimum Strategy for Producing Precise GPS Satellite Orbits using Double-Differenced Observations
...Show More Authors

Both the double-differenced and zero-differenced GNSS positioning strategies have been widely used by the geodesists for different geodetic applications which are demanded for reliable and precise positions. A closer inspection of the requirements of these two GNSS positioning techniques, the zero-differenced positioning, which is known as Precise Point Positioning (PPP), has gained a special importance due to three main reasons. Firstly, the effective applications of PPP for geodetic purposes and precise applications depend entirely on the availability of the precise satellite products which consist of precise satellite orbital elements, precise satellite clock corrections, and Earth orientation parameters. Secondly, the PPP processing strategy has been employed by the International GNSS Service (IGS) and IGS analysis centers to evaluate their products in terms of homogeneity and precision over a long period of time. Thirdly, the precise positions, which are determined using PPP technique, and are referenced directly to the geodetic reference frame of the satellite orbital parameters. Thus, the definition of the geodetic datum of the site coordinates using different strategies plays an enormous role in the process of generation satellite orbital parameters which have to be compatible with the corresponding satellite clock corrections and the Earth orientation parameters. This study focuses on producing uninterrupted series of satellite orbit and clock products using different criteria and assesses these products using PPP. The double-difference processing technique was used to achieve the goal of this study by Bernese GPS software version 5.0. Twenty-two globally distributed IGS stations were selected to run PPP based on the generated products and then compare the results with corresponding PPP results which were created based on the IGS rapid products. The comparison pointed to a significant improvement in the generated precise products which have considerably increased the precision of positions. What is more, this study stated that there is an observable agreement between the horizontal positions accuracies which are generated using different techniques for modeling the reference frame.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach: An Article Review
...Show More Authors

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr

... Show More
View Publication
Publication Date
Mon Feb 19 2018
Journal Name
Al-academy
The idea strategy in the theater
...Show More Authors

There is an association between the signifier and the signifier. This association shows the eyeball, which acquires a direct presence and whose presence influences the level of production of the hidden connotation. Because the theatrical presentation is a series of auditory-visual functions, these signs are looking for the exploration of their meanings and their evocation to form a complete loop to achieve the association of the above. This is what made the researcher to monitor the abundance of semantic shifts in theatrical presentation as long as the implications of the strategy continue in the game of semantic production with multiple horizons, and the idea in theatrical presentation tolerates multiple readings according to the refere

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 10 2025
Journal Name
Journal Of University Of Anbar For Pure Science (juaps)
Evaluation the Initial Values for Eccentric Anomaly for an Ellipse Orbit: Article Review
...Show More Authors

The equation of Kepler is used to solve different problems associated with celestial mechanics and the dynamics of the orbit. It is an exact explanation for the movement of any two bodies in space under the effect of gravity. This equation represents the body in space in terms of polar coordinates; thus, it can also specify the time required for the body to complete its period along the orbit around another body. This paper is a review for previously published papers related to solve Kepler’s equation and eccentric anomaly. It aims to collect and assess changed iterative initial values for eccentric anomaly for forty previous years. Those initial values are tested to select the finest one based on the number of iterations, as well as the

... Show More
View Publication
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Development of an Eco-Friendly Method for Iron Extraction and Determination in Pharmaceuticals Using Ciprofloxacin Drug as Chelating agent
...Show More Authors

A method is developed for the determination of iron (III) in pharmaceutical preparations by coupling cloud point extraction (CPE) and UV-Vis spectrophotometry. The method is based on the reaction of Fe(III) with excess drug ciprofloxacin (CIPRO) in dilute H2SO4, forming a hydrophobic Fe(III)- CIPRO complex which can be extracted into a non-ionic surfactant Triton X-114, and iron ions are determined spectrophotometrically at absorption maximum of 437 nm. Several variables which impact on the extraction and determination of Fe (III) are optimized in order to maximize the extraction efficiency and improve the sensitivity of the method. The interferences study is also considered to check the accuracy of the procedure. The results hav

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Gsc Biological And Pharmaceutical Sciences
Using the silicon (luminal cast plastination technique) for the lower respiratory tract in sheep as an alternative to cement
...Show More Authors

The lower respiratory tract of sheep was studied to determine the torsion and branching of the bronchial tree. The respiratory system of ruminants and all living organisms is one of the most important organs in the body that controls the amount of gas exchange between the heart and lungs through the airways, it is clear that in sheep it consists of a narrow bronchial tube that reaches the extent of lung tissue repercussions. He used silicon, water, acid, and at room temperature, and the substance was injected with an injection gun through the trachea and was pushed gently to spread and distribute in all parts of the lungs with moderate manual pressure. The results showed that the mold shape in the lung and the bronchial branches of

... Show More
View Publication
Crossref
Publication Date
Wed Oct 30 2024
Journal Name
Internet Technology Letters
Using <scp>5G</scp> Standards for Smart Healthcare Applications and Designing an Artificial Intelligence‐Based Industry 4.0 Communication System
...Show More Authors
ABSTRACT<p>The introduction of Industry 4.0, to improve Internet of Things (IoT) standards, has sparked the creation of 5G, or highly sophisticated wireless networks. There are several barriers standing in the way of 5G green communication systems satisfying the expectations for faster networks, more user capacity, lower resource consumption, and cost‐effectiveness. 5G standards implementation would speed up data transmission and increase the reliability of connected devices for Industry 4.0 applications. The demand for intelligent healthcare systems has increased globally as a result of the introduction of the novel COVID‐19. Designing 5G communication systems presents research problems such as optimizing </p> ... Show More
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
Gamipog: A deterministic genetic multi-parameter-order strategy for the generation of variabLE STRENGTH COVERING ARRAYS
...Show More Authors

Preview PDF
Scopus (4)
Scopus
Publication Date
Sun Jul 29 2018
Journal Name
Science International
THE EFFECT OF QUR'ANIC VERSES STRATEGY ON ACHIEVING SCIENCE AND SYSTEMIC INTELLIGENCE FOR SECOND GRADE STUDENTS.
...Show More Authors

The objective of the research is to uncover the effect of the strategy of Quranic verses in the collection of science and systemic intelligence for second-grade students. The research sample consisted of (48) students of second grade students in the middle of Al Rasheed Boys School of the second Karkh Directorate, Distribution in the two divisions, Division of (b) and experimental group that studied strategy of Quranic verses, and the Division (a) control group which studied the regular way, and results indicated a statistically significant differences for the experimental group students studied using the strategy Verses in systemic intelligence collection.

Preview PDF