There is a growing need for up-to-date data for rapid decision making in the modern digital age. Recently, the need for high-resolution topographic maps is highly demanding by most mapping clients. With the maturing automatic structure from mobile and multi-view stereoscopy software, small organizations and individuals now have the ability to make their own surveys based on mobile mapping devices. This study looks at how feasible using low-cost Unmanned Aerial Vehicle (UAV) as a mobile mapping device for photogrammetric topographical surveys. It is showing the impact of different UAV flight settings and parameters on the accuracy of mapping products. An automatic scenario for photogrammetric flight mission and its execution are proposed and described. The focus of this research is to generate 3D point clouds from digital imagery using low-cost UAV and showing the relationship between flight mission settings and the quality of the delivered 3D data. Automatic solution is presented and analysed, which automatically generate 3D point clouds from arbitrary image configurations. Results delivered within millimetres based on specific flight setting and optimal quality control considerations. Accuracy assessment and validation process was adopted based on statistical assessments according to ground truth 3D adjusted measurements to assure validity.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreMultiple applications use offline handwritten signatures for human verification. This fact increases the need for building a computerized system for signature recognition and verification schemes to ensure the highest possible level of security from counterfeit signatures. This research is devoted to developing a system for offline signature verification based on a combination of local ridge features and other features obtained from applying two-level Haar wavelet transform. The proposed system involves many preprocessing steps that include a group of image processing techniques (including: many enhancement techniques, region of interest allocation, converting to a binary image, and Thinning). In feature extraction and
... Show MoreAutomated clinical decision support system (CDSS) acts as new paradigm in medical services today. CDSSs are utilized to increment specialists (doctors) in their perplexing decision-making. Along these lines, a reasonable decision support system is built up dependent on doctors' knowledge and data mining derivation framework so as to help with the interest the board in the medical care gracefully to control the Corona Virus Disease (COVID-19) virus pandemic and, generally, to determine the class of infection and to provide a suitable protocol treatment depending on the symptoms of patient. Firstly, it needs to determine the three early symptoms of COVID-19 pandemic criteria (fever, tiredness, dry cough and breat
... Show MoreVisceral leishmaniasis (VL), the second-most-serious parasitic illness after malaria, is currently endemic in more than 88 countries. Need for new anti-leishmanial compounds is currently being taken into consideration by researchers due to resistance and lack of effective vaccinations. This research was conducted to find out more about the effect of artemisinin (ART). ART was examined in vitro promastigotes stages and ex vivo amastigotes stages of the Iraqi strain of Leishmania donovani in U937 cell line after 24, 48 and 27 hours using MTT assay. In addition, the level of macrophage nitric oxide (NO) was measured using Griess assay in U937 cell line. The results of promastigotes viability percentage
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MorePure and doped TiO 2 with Bi films are obtained by pulse laser deposition technique at RT under vacume 10-3 mbar, and the influence of Bi content on the photocvoltaic properties of TiO 2 hetrojunctions is studied. All the films display photovoltaic in the near visible region. A broad double peaks are observed around λ= 300nm for pure TiO 2 at RT in the spectral response of the photocurrent, which corresponds approximately to the absorption edge and this peak shift to higher wavelength (600 nm) when Bi content increase by 7% then decrease by 9%. The result is confirmed with the decreasing of the energy gap in optical properties. Also, the increasing is due to an increase in the amount of Bi content, and shifted to 400nm when annealed at 523
... Show MoreIn order to evaluate the effect of seed size, plant growth regulators and some chemical materials on seed vigour and seedling growth of rice (Oryza sativa L.) an experiment was conducted in 2015 at Laboratories of Agriculture and Marshes College, University of Thi-Qar. Factorial experiment in CRD was used with four replications in two factors. The first factor included three seed sizes (4.6-5.1, 5.2-5.7 and 5.8-6.3 mm). The second factor was seeds soaking treatments (KNO3 6 gl-1, CaCl2 20 gl-1, salicylic acid 20 mg l-1, cytokinin 40 mg l-1, gibberllic acid 400 mg l-1, ascorbic acid 40 mg l-1 and seeds soaked in distilled water). The results showed that the largest seed size influenced significantly and gave the higher averages of germinatio
... Show More