3D models delivered from digital photogrammetric techniques have massively increased and developed to meet the requirements of many applications. The reliability of these models is basically dependent on the data processing cycle and the adopted tool solution in addition to data quality. Agisoft PhotoScan is a professional image-based 3D modelling software, which seeks to create orderly, precise n 3D content from fixed images. It works with arbitrary images those qualified in both controlled and uncontrolled conditions. Following the recommendations of many users all around the globe, Agisoft PhotoScan, has become an important source to generate precise 3D data for different applications. How reliable is this data for accurate 3D modelling applications is the current question that needs an answer. Therefore; in this paper, the performance of the Agisoft PhotoScan software was assessed and analyzed to show the potential of the software for accurate 3D modelling applications. To investigate this, a study was carried out in the University of Baghdad / Al-Jaderia campus using data collected from airborne metric camera with 457m flying height. The Agisoft results show potential according to the research objective and the dataset quality following statistical and validation shape analysis.
Light naphtha treatment was achieved over 0.3wt%Pt loaded-alumina, HY-zeolite and Zr/W/HY-zeolite catalysts at temperature rang of 240-370°C, hydrogen to hydrocarbon mole ratio of 1-4 0.75-3 wt/wt/hr, liquid hourly space velocity (LHSV) and at atmospheric pressure. The hydroconversion of light naphtha over Pt loaded catalyst shows two main reactions; hydrocracking and hydroisomerization reactions. The catalytic conversion of a light naphtha is greatly influenced by reaction temperature, LHSV, and catalyst function. Naphtha transformation (hyroisomerization, cracking and aromatization) increases with decreasing LHSV and increasing temperature except hydroisomerization activity increases with increasing of temperature till 300°C then began
... Show MoreThis growing interest of the international scientific specialized commissions is due to the role that the audit committee can play, as one of companies’ governance tools, to increase the accuracy and transparency of the financial information disclosed by the companies, through its oversight role on the process of preparing financial reports, its supervision on the internal audit function within the companies, and supporting its independency, as well as coordinating the efforts between the internal control unites and the external auditor represented by the (Board of Supreme Audit) to clear the observations and irregularities in order to reduce the fraud cases.
This research was built on an applied sample of audit committee works
... Show MoreThe research aims to examine the evaluation of educational quality management and the ways to improve it in the College of Education for Women at the University of Baghdad from the point of view of the academic staff. The research community consisted of (288) participants comprising all members of the academic staff in the College of Education for Women at the University of Baghdad for the academic year (2019-2020). As for the questionnaire, it was distributed to the academic staff of the scientific departments according to their affiliation for the purpose of identifying the availability of the requirements of the quality of the teaching service provided to them by the educational institution. The researcher adopted a questionnaire deve
... Show MoreOne of the main parts in hydraulic system is directional control valve, which is needed in order to operate hydraulic actuator. Practically, a conventional directional control valve has complex construction and moving parts, such as spool. Alternatively, a proposed Magneto-rheological (MR) directional control valve can offer a better solution without any moving parts by means of MR fluid. MR fluid consists of stable suspension of micro-sized magnetic particles dispersed in carrier medium like hydrocarbon oil. The main objectives of this present research are to design a MR directional control valve using MR fluid, to analyse its magnetic circuit using FEMM software, and to study and simulate the performance of this valve. In this research, a
... Show MoreThis work is concerned with designing two types of controllers, a PID and a Fuzzy PID, to be used
for flying and stabilizing a quadcopter. The designed controllers have been tuned, tested, and
compared using two performance indices which are the Integral Square Error (ISE) and the Integral
Absolute Error (IAE), and also some response characteristics like the rise time, overshoot, settling
time, and the steady state error. To try and test the controllers, a quadcopter mathematical model has
been developed. The model concentrated on the rotational dynamics of the quadcopter, i.e. the roll,
pitch, and yaw variables. The work has been simulated with “MATLAB”. To make testing the
simulated model and the controllers m
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreAnomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show MoreThese deposits take many forms like current acc, deposits in order to growth and serve national economy Various in varicose perspectives .
The problem of this paper its concern with un applied the mathematical models that used in profitability analysis of current acc , and deposits in view of risk, profit efficiency and financial leverage for this reason the paper discussion use the cumulate mathematical model to solve these problem, that content three variables that be used to measuring profitability by consequent replacement method by stable base and by moving base for 2007 – 2009 applied the data collect from Iraq middle east bank. &nbs
... Show More