3D models delivered from digital photogrammetric techniques have massively increased and developed to meet the requirements of many applications. The reliability of these models is basically dependent on the data processing cycle and the adopted tool solution in addition to data quality. Agisoft PhotoScan is a professional image-based 3D modelling software, which seeks to create orderly, precise n 3D content from fixed images. It works with arbitrary images those qualified in both controlled and uncontrolled conditions. Following the recommendations of many users all around the globe, Agisoft PhotoScan, has become an important source to generate precise 3D data for different applications. How reliable is this data for accurate 3D modelling applications is the current question that needs an answer. Therefore; in this paper, the performance of the Agisoft PhotoScan software was assessed and analyzed to show the potential of the software for accurate 3D modelling applications. To investigate this, a study was carried out in the University of Baghdad / Al-Jaderia campus using data collected from airborne metric camera with 457m flying height. The Agisoft results show potential according to the research objective and the dataset quality following statistical and validation shape analysis.
The aim of the research is to shed light on the dimensions of the strategic lens and its impact on achieving the pioneer tax performance and represented by the dimensions (strategic direction, growth, pilot indicator, renewal and modernization, efficiency and effectiveness) in the General Tax Authority. The questionnaire was adopted as a tool to collect data and information from the adult sample They are (91) who are on the site (Assistant Director General, Head of Division, First Division Deputy, Second Division Deputy, Division Officer, Division Officer Associate) The statistical program (SPSS) has been used to calculate (the mean, the standard deviation, the correlation coefficient, the difference coefficient, the F test, the
... Show MoreIn this paper, variable gain nonlinear PD and PI fuzzy logic controllers are designed and the effect of the variable gain characteristic of these controllers is analyzed to show its contribution in enhancing the performance of the closed loop system over a conventional linear PID controller. Simulation results and time domain performance characteristics show how these fuzzy controllers outperform the conventional PID controller when used to control a nonlinear plant and a plant that has time delay.
In this paper, variable gain nonlinear PD and PI fuzzy logic controllers are designed and the effect of the variable gain characteristic of these controllers is analyzed to show its contribution in enhancing the performance of the closed loop system over a conventional linear PID controller. Simulation results and time domain performance characteristics show how these fuzzy controllers outperform the conventional PID controller when used to control a nonlinear plant and a plant that has time delay.
A high percentage of existing buildings in Iraq are traditional buildings, yet there is approximately no such green building in Baghdad or other governorates. Most of these buildings require urgent upgrading to increase their performance (operationally, economically, and environmentally), also the building owners looking for identifying and implementing many of the green building measures to reduce the operational and maintenance costs of their buildings. The decision-makers need to support the possibility of achieving sustainable measures of existing building rating systems such as LEED or BREEAM, and that would require an optimization model. The goal of this study is to maximize the
The current research tackles the self-efficacy and its relation to the cognitive assessment for the daily disturbances for the University of Baghdad students. Two criteria have been adopted to achieve the objectives of the research. The sample of this study consists of 200 male and female students who were chosen randomly. The data were analyzed statistically, revealing that the university students owned their own self-efficacy as well as a cognitive assessment for the daily disturbances and they recognized them as self-threatening. The results also indicated the existence of a prediction activity in the field of the cognitive assessment to the daily disturbances selection. In light of the acquired results, the study recommends the neces
... Show MoreThe research aims to identify the role of the dimensions of financial inclusion in achieving the competitive advantage by An exploratory research of the views of a sample of customers of the 20 Algerian commercial banks, And the relationship between its dimensions (Access dimension, Usage dimension, Quality) And competitive advantage. This research is based on the analytical descriptive approach. The questionnaire was adopted as a main tool in collecting data and information on the sample of 377.
The The research showed several results, the most important of which is a strong correlation between the dimensions of the three financial inclusion combined and the competitive advantage of the Algerian commercial banks, and explained t
... Show MoreIn this modern Internet era and the transition to IPv6, routing protocols must adjust to assist this transformation. RIPng, EIGRPv6 and OSPFv3 are the dominant IPv6 IGRP (Interior Gateway Routing Protocols). Selecting the best routing protocol among the available is a critical task, which depends upon the network requirement and performance parameters of different real time applications. The primary motivation of this paper is to estimate the performance of these protocols in real time applications. The evaluation is based on a number of criteria including: network convergence duration, Http Page Response Time, DB Query Response Time, IPv6 traffic dropped, video packet delay variation and video packet end to end de
... Show MoreIn recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve
... Show More