With the increasing demands to use remote sensing approaches, such as aerial photography, satellite imagery, and LiDAR in archaeological applications, there is still a limited number of studies assessing the differences between remote sensing methods in extracting new archaeological finds. Therefore, this work aims to critically compare two types of fine-scale remotely sensed data: LiDAR and an Unmanned Aerial Vehicle (UAV) derived Structure from Motion (SfM) photogrammetry. To achieve this, aerial imagery and airborne LiDAR datasets of Chun Castle were acquired, processed, analyzed, and interpreted. Chun Castle is one of the most remarkable ancient sites in Cornwall County (Southwest England) that had not been surveyed and explored by non-destructive techniques. The work outlines the approaches that were applied to the remotely sensed data to reveal potential remains: Visualization methods (e.g., hillshade and slope raster images), ISODATA clustering, and Support Vector Machine (SVM) algorithms. The results display various archaeological remains within the study site that have been successfully identified. Applying multiple methods and algorithms have successfully improved our understanding of spatial attributes within the landscape. The outcomes demonstrate how raster derivable from inexpensive approaches can be used to identify archaeological remains and hidden monuments, which have the possibility to revolutionize archaeological understanding.
This research is a critical methodological study deals with some Quranic verses abrogative,abrogated.
by Ibn al-Jawzi (may Allah have mercy on him) in his book (Tafseer Zad al-Maseer) inin Surah Al-Baqara the in the holy Quraan.
Epithelial and stromal communications are essential for normal uterine functions and their dysregulation contributes to the pathogenesis of many diseases including infertility, endometriosis, and cancer. Although many studies have highlighted the advantages of culturing cells in 3D compared to the conventional 2D culture system, one of the major limitations of these systems is the lack of incorporation of cells from non‐epithelial lineages. In an effort to develop a culture system incorporating both stromal and epithelial cells, 3D endometrial cancer spheroids are developed by co‐culturing endometrial stromal cells with cancerous epithelial cells. The spheroids developed by this method are phenot
DBNRSK Sayed, Journal of Strategic Research in Social Science (JoSReSS), 2020
This work consists of a numerical simulation to predict the velocity and temperature distributions, and an experimental work to visualize the air flow in a room model. The numerical work is based on non-isothermal, incompressible, three dimensional, k turbulence model, and solved using a computational fluid dynamic (CFD) approach, involving finite volume technique to solve continuity, momentum and energy equations, that governs the room’s turbulent flow domain. The experimental study was performed using (1/5) scaled room model of the actual dimensions of the room to simulate room air flow and visualize the flow pattern using smoke generated from burnt herbs and collected in a smoke generator to delivered through
... Show MoreFerrite with general formula Ni1-x Cox Fe2O4(where x=0.0.1,0.3,0.5,0.7, and 0.9), were prepared by standard ceramic technique. The main cubic spinel structure phase for all samples was confirmed by x-ray diffraction patterns. The lattice parameter results were (8.256-8.299 °A). Generally, x -ray density increased with the addition of Cobalt and showed value between (5.452-5.538gm/cm3). Atomic Force Microscopy (AFM) showed that the average grain size and surface roughness was decreasing with the increasing cobalt concentration. Scanning Electron Microscopy images show that grains had an irregular distribution and irregular shape. The A.C conductivity was found to increase with the frequency and the addition of Cobal
... Show MoreBackground: A Temporomandibular joint (TMJ) internal derangement (TMJID) is a disruption within the internal aspects of the TMJ in which the disc is displaced from its normal functional relationship with the mandibular condyle, after which the articular portion of the temporal bone causes joint dysfunction, joint sound, malocclusion, and locking of the mouth. Conservative and invasive techniques can be used for the treatment of TMJID. A platelet-rich plasma (PRP) injection is a simple, less invasive surgical procedure for the treatment of internal derangement. The objective of this study was to evaluate the efficacy of PRP injections in decreasing or eliminating pain, clicking, and limitation of mouth opening in patients with TMJID after th
... Show MoreThe Arabic pronouns received a lot of attention from the ancient Arab grammarians, so they explained their origins, the different forms of their structure, and the aspects of the Arabs’ use of them, and explained the aspects and reasons for these uses, with what they had of linguistic insight, which guided them to clarify the truth of these pronouns.
And recently, this research seeks new knowledge of the development of the structure of the nominative pronouns (he), (she), (them), (taa), and (waw) between dialects and towards classical Arabic, by analyzing the structure of these pronouns into their components. Its linguistic formulas are traced from the ancient Arabic texts, and by ancient I mean the texts of the era of linguistic ci
The paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain
... Show More