Preferred Language
Articles
/
rhc2WZABVTCNdQwCsIeN
How geometric reverse engineering techniques can conserve our heritage; a case study in Iraq using 3D laser scanning
...Show More Authors
Abstract<p>Laser scanning has become a popular technique for the acquisition of digital models in the field of cultural heritage conservation and restoration nowadays. Many archaeological sites were lost, damaged, or faded, rather than being passed on to future generations due to many natural or human risks. It is still a challenge to accurately produce the digital and physical model of the missing regions or parts of our cultural heritage objects and restore damaged artefacts. The typical manual restoration can become a tedious and error-prone process; also can cause secondary damage to the relics. Therefore, in this paper, the automatic digital application process of 3D laser modelling of artefacts in virtual restoration is presented based on reverse engineering techniques. Two case studies were selected and processed in Iraq to meet the aim of this research and show how reverse engineering approaches can save our culture. The efficiency and safety of the preservation and restoration of cultural relics are improved and visually demonstrated. Different reverse engineering techniques applied to show the geometric potential for such approaches following laser-based 3D data application.</p>
Scopus Clarivate Crossref
View Publication
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Towards a new global leadership to combat international terrorism
...Show More Authors

In the early 1990s, as the beginning of the new unilateral leadership of global power by the United States, a new climate of rivalry emerged between revolutionary jihad and national jihad. Al-Qaeda has played on both sides to promote its agenda in support of global jihad. The veteran Afghan warriors returned to the Arab world after the play against the Soviet army "infidel" in Afghanistan after the Soviet invasion of Afghanistan in 1979 and until the disintegration of the Soviet Union in 1990. The Arab world is looking for roles to attract international forces seeking to implement specific projects that need a combat tool . Al-Qaeda has tried to exploit national conflicts and the emergence of sectarian political streams in the Middle Eas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 09 2017
Journal Name
Sensors
A Multimodality Hybrid Gamma-Optical Camera for Intraoperative Imaging
...Show More Authors

The development of low profile gamma-ray detectors has encouraged the production of small field of view (SFOV) hand-held imaging devices for use at the patient bedside and in operating theatres. Early development of these SFOV cameras was focussed on a single modality—gamma ray imaging. Recently, a hybrid system—gamma plus optical imaging—has been developed. This combination of optical and gamma cameras enables high spatial resolution multi-modal imaging, giving a superimposed scintigraphic and optical image. Hybrid imaging offers new possibilities for assisting clinicians and surgeons in localising the site of uptake in procedures such as sentinel node detection. The hybrid camera concept can be extended to a multimodal detec

... Show More
View Publication
Scopus (24)
Crossref (25)
Scopus Clarivate Crossref
Publication Date
Thu Dec 15 2022
Journal Name
Journal Of Baghdad College Of Dentistry
Force degradation of orthodontic elastomeric chains: A literature review
...Show More Authors

Background: Elastomeric chains are used to generate force in many orthodontic procedures, but this force decays over time, which could affect tooth movement. This study aimed to study the force degradation of elastomeric chains. Data and Sources: An electronic search on Cochrane Central Register of Controlled Trials (CENTRAL), MEDLINE, LILACS, and PubMed was made, only articles written in English were included, up to January 2022.Study selection: Fifty original articles, systematic reviews, and RCTs were selected. Conclusion: Tooth movement, salivary enzymes, alcohol-containing mouthwash, whitening mouthwash, and alkaline and strong acidic (pH <5.4) solutions all have a significant impact on elastomeric chain force degradation. The fo

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Educational And Psychological Researches
Constructing a Scale of Emotional Adjustment among Kindergarten Children
...Show More Authors

The aim of the current research is to construct a scale of emotional adjustment for kindergarten children and to set a standard for its evaluation. To achieve this, a scale consisting of (19) items was prepared. The mother of the child answered by adopting the method of self-report, which is expressed in the form of reporting terms, as each item represents a situation in the child's life and each situation has three alternatives to answer that represent various responses to the mentioned situation. One of the alternatives represents the emotionally adaptive response, which is given a degree (3), the second response expresses the emotional adjustment partly that took the degree of (2), and the third response expresses the weakness of emot

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 30 2004
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Factors Affecting the Operation of a Fire Tube Boiler
...Show More Authors

View Publication Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Zebra Mussel Dreissena polymorpha a pest infesting the electricity
...Show More Authors

The oyster ??????? (planned) (Pallas) of lesions that have entered Iraq recently became spyware severe damage in more than a station from power plants in Iraq, including the power plant in Mussayab Vamahar accumulates in pipes cooling and disrupts their work Vtafrtf heat systems cooling and thereby determiningefficiency and lead to added cost many cleaning or replacement of damaged parts

View Publication Preview PDF
Publication Date
Thu Jan 10 2019
Journal Name
Applied Physics A
Characterization and nanocrystalline growth of a-Ge:In/c-GaAs
...Show More Authors

View Publication
Scopus (2)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Variant Domination Types for a Complete h-ary Tree
...Show More Authors

Graph  is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree  are determined.

View Publication Preview PDF
Scopus (18)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Oct 15 2014
Journal Name
International Journal Of Advanced Research
A survey/ Development of Passive Optical Access Networks Technologies
...Show More Authors

The bandwidth requirements of telecommunication network users increased rapidly during the last decades. Optical access technologies must provide the bandwidth demand for each user. The passive optical access networks (PONs) support a maximum data rate of 100 Gbps by using the Orthogonal Frequency Division Multiplexing (OFDM) technique in the optical access network. In this paper, the optical broadband access networks with many techniques from Time Division Multiplexing Passive Optical Networks (TDM PON) to Orthogonal Frequency Division Multiplex Passive Optical Networks (OFDM PON) are presented. The architectures, advantages, disadvantages, and main parameters of these optical access networks are discussed and reported which have many ad

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref