Preferred Language
Articles
/
joe-975
Evaluation of the Accuracy of Digital Elevation Model Produced from Different Open Source Data
...Show More Authors

This study aims to estimate the accuracy of digital elevation models (DEM) which are created with exploitation of open source Google Earth data and comparing with the widely available DEM datasets, Shuttle Radar Topography Mission (SRTM), version 3, and Advanced Spaceborne Thermal Emission and Reflection Radiometer Global Digital Elevation Model (ASTER GDEM), version 2. The GPS technique is used in this study to produce digital elevation raster with a high level of accuracy, as reference raster, compared to the DEM datasets. Baghdad University, Al Jadriya campus, is selected as a study area. Besides, 151 reference points were created within the study area to evaluate the results based on the values of RMS.Furthermore, the Geographic Information System (GIS) was utilized to analyze, imagine and interpolate data in this study. The result of the statistical analysis revealed that RMSE of DEM related to the differences between the reference points and Google Earth, SRTM DEM and ASTER GDEM are 6.9, 5.5 and 4.8, respectively. What is more, a finding of this study shows convergence the level of accuracy for all open sources used in this study.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
College Of Islamic Sciences
Infrastructure components Reading in selected texts from the letters of the Brothers of Purity
...Show More Authors

Absract

The letters of the Al-Safa Brothers contain many tales, in which each story is a literary text that is independent from the other texts, but it constitutes a unified entity in its entirety, because these stories contain recurring structural elements that go into building each one of them. The stories - the subject of the analysis - were not keen on something that was keen on adhering to the Sufi vision and its apparent effect on the tales of the messages, starting with the announcement of the narration to the narrator and his attempt to persuade the recipient of the truth of what is being told and its realism, and made him believe it. The stories correspond to the formal construction of the ideal style defined by th

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Water Resource And Hydraulic Engineering (jwrhe)
Large Scale Field Physical Model Simulation of Roseires Dam-Break, Sudan
...Show More Authors

Physically based modeling approach has been widely developed in recent years for the simulation of dam failure process due to the lack of field data. This paper provides and describes a physically-based model depending on dimensional analysis and hydraulic simulation methods for estimating the maximum water level and the wave propagation time from breaching of field test dams. The field physical model has been constructed in Dabbah city to represent the collapse of the Roseires dam in Sudan. Five cases of a dam failure were studied to simulate water flood conditions by changing initial water height in the reservoir (0.8, 1.0, 1.2, 1.4 and 1.5 m respectively).The physical model working under five cases, case 5 had the greatest influence of t

... Show More
Publication Date
Sat Jun 01 2024
Journal Name
Pakistan Journal Of Criminology
Artificial Intelligence Technology in the Field of Modern Forensic Evidence: Brain Fingerprinting as a Model
...Show More Authors

Brain Fingerprinting (BF) is one of the modern technologies that rely on artificial intelligence in the field of criminal evidence law. Brain information can be obtained accurately and reliably in criminal procedures without resorting to complex and multiple procedures or questions. It is not embarrassing for a person or even violates his human dignity, as well as gives immediate and accurate results. BF is considered one of the advanced techniques related to neuroscientific evidence that relies heavily on artificial intelligence, through which it is possible to recognize whether the suspect or criminal has information about the crime or not. This is done through Magnetic Resonance Imaging (EEG) of the brain and examining

... Show More
View Publication
Publication Date
Mon Aug 01 2022
Journal Name
Journal Of Physics: Conference Series
The local bifurcation analysis of two preys stage-structured predator model with anti-predator behavior
...Show More Authors
Abstract<p>This paper deals with two preys and stage-structured predator model with anti-predator behavior. Sufficient conditions that ensure the appearance of local and Hopf bifurcation of the system have been achieved, and it’s observed that near the free predator, the free second prey and the free first prey equilibrium points there are transcritical or pitchfork and no saddle node. While near the coexistence equilibrium point there is transcritical, pitchfork and saddle node bifurcation. For the Hopf bifurcation near the coexistence equilibrium point have been studied. Further, numerical analysis has been used to validate the main results.</p>
View Publication
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Indian Journal Of Natural Sciences
Determination of the Electron Density Variation for Ionosphere Layer Over Iraqi Zone Using IRI Model
...Show More Authors

KA Hadi, AH Asma’a, IJONS, 2018 - Cited by 1

View Publication
Publication Date
Tue Dec 25 2018
Journal Name
Summaries Of Working Papers, Research And Experiments
E-learning at the College of Mass Communication, subject: public relations campaigns as a model
...Show More Authors

Publication Date
Tue Dec 10 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Development of Robust and Efficient Symmetric Random Keys Model based on the Latin Square Matrix
...Show More Authors

Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Mon May 01 2017
Journal Name
Energy Procedia
A Coupled Model of the Linear Joule Engine with Embedded Tubular Permanent Magnet Linear Alternator
...Show More Authors

Scopus (16)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Journal Of Physics: Conference Series
An Integrated Model of The Relation Between E-Service Quality and User Satisfaction in IHL
...Show More Authors
Abstract<p>Quality of e-service is one of the critical factors that decide the success or failure of organizations. It may increase competitive advantages as well as enhance the relationships with the customers. Achieving high e-service quality and user satisfaction are challenging since they depend fundamentally on user perception and expectation which can be tricky at times. To date, there is no agreement as to what service quality is, and how it should be measured, whether it is a function of statistical measures of quality including physical defects or managerial judgment, or it is a function of customer perception about the services. This paper deep-dived the quality of e-services offered b</p> ... Show More
View Publication
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Wed Apr 11 2018
Journal Name
Acta Neuropathologica Communications
Zidovudine ameliorates pathology in the mouse model of Duchenne muscular dystrophy via P2RX7 purinoceptor antagonism
...Show More Authors

View Publication
Scopus (30)
Crossref (30)
Scopus Clarivate Crossref