Preferred Language
Articles
/
qhc1WZABVTCNdQwCkYea
Revealing the potentials of 3D modelling techniques; a comparison study towards data fusion from hybrid sensors
...Show More Authors
Abstract<p>The vast advantages of 3D modelling industry have urged competitors to improve capturing techniques and processing pipelines towards minimizing labour requirements, saving time and reducing project risk. When it comes to digital 3D documentary and conserving projects, laser scanning and photogrammetry are compared to choose between the two. Since both techniques have pros and cons, this paper approaches the potential issues of individual techniques in terms of time, budget, accuracy, density, methodology and ease to use. Terrestrial laser scanner and close-range photogrammetry are tested to document a unique invaluable artefact (Lady of Hatra) located in Iraq for future data fusion scenario. Insight investigations of the factors affecting data processing and modelling in individual comparing techniques are discussed and analysed. Qualitative and quantitative statistical analysis was applied based on multiple criteria, such as level of automation (LOA), accuracy and point cloud integrity towards the adaption of data fusion approaches and co-registering frameworks for optimal deliverables.</p>
Scopus Clarivate Crossref
View Publication
Publication Date
Thu Aug 18 2022
Journal Name
Dental Hypotheses
Microleakage Evaluation of Glass Hybrid Restoration Following Usage of Papain-Based Gel and Ceramic Bur for Caries Removal: An in Vitro Study
...Show More Authors

Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
IMPROVED STRUCTURE OF DATA ENCRYPTION STANDARD ALGORITHM
...Show More Authors

The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene

... Show More
Publication Date
Sun Jan 01 2023
Journal Name
2nd International Conference On Mathematical Techniques And Applications: Icmta2021
Review of clustering for gene expression data
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Wed Mar 15 2023
Journal Name
Al-academy
The gratifications of local television sports programs from the audience's point of view Analytical study for the period from 1/7/2022 to 01/10/2022
...Show More Authors

The issue of sports media and its role in winning sports and non-sports fans and unifying them towards various issues and events is one of the important topics that have begun to occupy many countries and governments in the world and allocate appropriate spaces for it and provide it with sufficient funds and budgets to advance this reality...

Especially since the concept of the sports official has It changed a lot and turned into an economic concept rather than a sport one through the investment in the field of sports and the entry of capital and contributes to the prosperity of the countries interested in this field.

It is important that includes profit and loss in addition to knowing how to employ and win the masses and e

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 11 2023
Journal Name
Journal Of Educational And Psychological Researches
International Studies Concerning Teachers’ Attitudes towards the Inclusion of Students with Special Educational Needs: Review of Literature
...Show More Authors

Over the years, the issue of inclusion of students with special educational needs (SEN) in mainstream schools is controversial worldwide. Evidence from research argues that without a positive teachers’ attitude towards the inclusion of students with SEN in mainstream schools, the successful implementation of inclusion is most likely doubtable. The aim of this paper is to understand teachers’ attitudes towards the inclusion of students with SEN in mainstream schools from different perspectives and from different contexts. The conclusion drawn in this review can be that teachers’ attitude is the most important key towards the appropriate inclusion implementation in mainstream schools. The disparity of teachers’ attitudes towards th

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 02 2018
Journal Name
Indian Journal Of Public Health Research & Development
A revised checklist of the blister beetles genera (Coleoptera, Meloidae) from Iraq
...Show More Authors

Publication Date
Sat Jul 01 2017
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
A REVISED CHECKLIST OF THE ROBBER FLY GENERA (DIPTERA, ASILIDAE) FROM IRAQ
...Show More Authors

    A revised checklist of the robber fly genera (Diptera, Asilidae) was given during this study in Iraq. The investigation showed (21) genera belonging to seven subfamilies, two genera new recorded to entomofauna of Iraq (Promachus Loew, 1848 and Genus: Dysmacus Loew, 1860). Eight genera showed in this investigation and eleven genera were recorded previously to Iraq.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Jun 01 2015
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Performance Comparison of Transport Layer Protocols
...Show More Authors

Transport layer is responsible for delivering data to the appropriate application process on the host computers. The two most popular transport layer protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP is considered one of the most important protocols in the Internet. UDP is a minimal message-oriented Transport Layer protocol. In this paper we have compared the performance of TCP and UDP on the wired network. Network Simulator (NS2) has been used for performance Comparison since it is preferred by the networking research community. Constant bit rate (CBR) traffic used for both TCP and UDP protocols.

View Publication
Publication Date
Wed Jun 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Hurst exponent estimation methods
...Show More Authors

Through recent years many researchers have developed methods to estimate the self-similarity and long memory parameter that is best known as the Hurst parameter. In this paper, we set a comparison between nine different methods. Most of them use the deviations slope to find an estimate for the Hurst parameter like Rescaled range (R/S), Aggregate Variance (AV), and Absolute moments (AM), and some depend on filtration technique like Discrete Variations (DV), Variance versus level using wavelets (VVL) and Second-order discrete derivative using wavelets (SODDW) were the comparison set by a simulation study to find the most efficient method through MASE. The results of simulation experiments were shown that the performance of the meth

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Hurst exponent estimation methods
...Show More Authors