With the increasing demands to use remote sensing approaches, such as aerial photography, satellite imagery, and LiDAR in archaeological applications, there is still a limited number of studies assessing the differences between remote sensing methods in extracting new archaeological finds. Therefore, this work aims to critically compare two types of fine-scale remotely sensed data: LiDAR and an Unmanned Aerial Vehicle (UAV) derived Structure from Motion (SfM) photogrammetry. To achieve this, aerial imagery and airborne LiDAR datasets of Chun Castle were acquired, processed, analyzed, and interpreted. Chun Castle is one of the most remarkable ancient sites in Cornwall County (Southwest England) that had not been surveyed and explored by non-destructive techniques. The work outlines the approaches that were applied to the remotely sensed data to reveal potential remains: Visualization methods (e.g., hillshade and slope raster images), ISODATA clustering, and Support Vector Machine (SVM) algorithms. The results display various archaeological remains within the study site that have been successfully identified. Applying multiple methods and algorithms have successfully improved our understanding of spatial attributes within the landscape. The outcomes demonstrate how raster derivable from inexpensive approaches can be used to identify archaeological remains and hidden monuments, which have the possibility to revolutionize archaeological understanding.
Abstract:
the current research aims at analyzing the efficiency of the private university teaching that recently expanded after 2003 ,;besides , the commitment of the private colleges ,definitely Al-Maamun and Al-Mansour colleges with strategy of the ministry of higher education and scientific research. This could be done through many indications that measure the efficiency of the private university teaching , including ( the indication of the efficiency of using human resources and efficiency in using the materialistic indications. But the human efficiency in these colleges , including the sample of the research ( Maamun
... Show MoreIn this work, an experimental analysis is made to predict the thermal performance of the natural-convection phenomenon from a heated vertical externally finned-tube to surrounding air through an open-ended enclosure. Two different configurations of longitudinal rectangular fin namely, continuous and interrupted are utilized with constant thickness, different numbers, and different heights are extended radially on the outer surface of a heated tube. The tube is heated electrically from inner surface with five varied power input magnitudes. The effect of fins configuration, fins number, fins height, and heat flux of the inner tube surface on the thermal performance of natural c
... Show MoreIn this paper, a modified derivation has been introduced to analyze the construction of C-space. The profit from using C-space is to make the process of path planning more safety and easer. After getting the C-space construction and map for two-link planar robot arm, which include all the possible situations of collision between robot parts and obstacle(s), the A* algorithm, which is usually used to find a heuristic path on Cartesian W-space, has been used to find a heuristic path on C-space map. Several modifications are needed to apply the methodology for a manipulator with degrees of freedom more than two. The results of C-space map, which are derived by the modified analysis, prove the accuracy of the overall C-space mapping and cons
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreThere are many studies that discussed the famous museum's graveyards in the Islamic worlds, to study the lives of these figures, there are many difficulties for their studies because the first we need the regularity and history information, and many sciences support, such as in language, geography information.
I am studying the research from Maraqid Al-Maaraf book by Harz Aldeen, the book has large members about the persons have graved in Persian Country in the middle ages, there are more than (30) figures in my study, I have studied every figure in this research depending on the sources and references books.
The research aims to enhance the level of evaluation of the performance of banking transactions control policies and procedures. The research is based on the following hypothesis: efficient transactions control policies and procedures contribute enhancing financial reporting, by assessing non-application gap of those policies and procedures in a manner that helps to prevent, discover, and correct material misstatements. The researchers designed an examination list that includes the control policies and procedures related to the transactions, as a guide to the bank audit program prepared by the Federal Financial Supervision Bureau. The research methodology is
... Show MoreThis study investigates the influence of silver oxide (Ag2O) concentration on the optical characteristics of phosphate bioactive glasses (PBGs). PBGs have emerged as promising alternatives to conventional silicate glasses in the medical field due to their excellent bioactivity and chemical resistance. Samples with varying Ag2O concentrations (0, 0.25, 0.5, and 0.75g) were sintered at 780°C for 2 hrs in an electric furnace. The samples were subjected to Fourier transfer infrared spectroscopy (FTIR), ultraviolet-visible (UV-Vis) spectroscopy, and photoluminescence (PL) tests to assess their functional groups and optical properties. By analyzing the FTIR spectrum of phosphate bioactive glass containing different amounts of Ag2O, it is
... Show MoreAbstract
In this work, the plasma parameters (electron temperature (Te), electron density( ne), plasma frequency (fp) and Debye length (λD)) have been studied by using the spectrometer that collect the spectrum of Laser produce CdTe(X):S(1-X) plasma at X=0.5 with different energies. The results of electron temperature for CdTe range 0.758-0.768 eV also the electron density 3.648 1018 – 4.560 1018 cm-3 have been measured under vacuum reaching 2.5 10-2 mbar .Optical properties of CdTe:S were determined through the optical transmission method using ultraviolet visible spectrophotometer within the r
... Show MoreHusain as a king of Iraq.
This paper deals with the British communication with faisel . then Winston Churchill's speech in British common house .then fodlowed by arriving faisal to Iraq after that the referend um faisel .
The his claims of British maneuver lastly coronation on faisal & his inauguration as a king of Iraq.