With the increasing demands to use remote sensing approaches, such as aerial photography, satellite imagery, and LiDAR in archaeological applications, there is still a limited number of studies assessing the differences between remote sensing methods in extracting new archaeological finds. Therefore, this work aims to critically compare two types of fine-scale remotely sensed data: LiDAR and an Unmanned Aerial Vehicle (UAV) derived Structure from Motion (SfM) photogrammetry. To achieve this, aerial imagery and airborne LiDAR datasets of Chun Castle were acquired, processed, analyzed, and interpreted. Chun Castle is one of the most remarkable ancient sites in Cornwall County (Southwest England) that had not been surveyed and explored by non-destructive techniques. The work outlines the approaches that were applied to the remotely sensed data to reveal potential remains: Visualization methods (e.g., hillshade and slope raster images), ISODATA clustering, and Support Vector Machine (SVM) algorithms. The results display various archaeological remains within the study site that have been successfully identified. Applying multiple methods and algorithms have successfully improved our understanding of spatial attributes within the landscape. The outcomes demonstrate how raster derivable from inexpensive approaches can be used to identify archaeological remains and hidden monuments, which have the possibility to revolutionize archaeological understanding.
The continued acceleration in the business environment has led to the need for organizations great attention to quality applied in organizations to meet the needs of customers and stay in the market for as long as possible.
Search launched from the underlying problem is the presence of concentrations of defects and waste plaguing the company and to achieve the goal of the study detects the level of quality applied in the factory vessels and reservoirs of the General Company for Heavy Engineering Equipment, As well as calculate wastage rates occurring in the production process and find a relationship between the level of quality and ratios defective in each type of waste, it has been used quantitative meas
... Show MoreThe dangers of (Israel's) integration with Arab countries in the middle east region will threaten the Arab security structure dimension, which the latter makes the Arab regional system vulnerable for distortion due to its nominal and symbolic value which is far from the Arab self and questioning with its effectiveness in comparing with the real capabilities to Arab countries in achieving the common targets. So, how to assess the different problems that began to hit the structure of the Arab regional system? and how to pledge an allegiance after putting forward what is known as the American Deal of the Century for the administration of former US President Donald Trump for making another step toward normalization with (Israel)?. The reveal
... Show MoreIn this paper the effect of engagement length, number of teeth, amount of applied load, wave propagation time, number of cycles, and initial crack length on the principal stress distribution, velocity of crack propagation, and cyclic crack growth rate in a spline coupling subjected to cyclic torsional impact have been investigated analytically and experimentally. It was found that the stresses induced due to cyclic impact loading are higher than the stresses induced due to impact loading with high percentage depends on the number of cycles and total loading time. Also increasing the engagement length and the number of teeth reduces the principal stresses (40%) and
(25%) respectively for increasing the engagement length from (0.15 to 0
Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreSTAG proteins, which are part of the cohesin complex and encoded by the STAG genes, are known as Irr1/Scc3 in yeast and as SA/STAG/stromalin in mammals. There are more variants as there are alternate splice sites, maybe three open reading frames (ORFs) code for three main proteins, including: SA1 (STAG1), SA2 (STAG2) and SA3 (STAG3). The cohesin protein complex has various essential roles in eukaryotic cell biology. This study compared the expression of the STAG1 gene in four different breast cancer cell lines, including: MCF-7, T-47D, MDA-MB-468, and MDA-MB-231 and normal breast tissue. RNA was extracted from these cell lines and mRNA was converted to cDNA, and then expression of the STAG1 gene was quantified by three sets of specific prim
... Show MoreLongitudinal data is becoming increasingly common, especially in the medical and economic fields, and various methods have been analyzed and developed to analyze this type of data.
In this research, the focus was on compiling and analyzing this data, as cluster analysis plays an important role in identifying and grouping co-expressed subfiles over time and employing them on the nonparametric smoothing cubic B-spline model, which is characterized by providing continuous first and second derivatives, resulting in a smoother curve with fewer abrupt changes in slope. It is also more flexible and can pick up on more complex patterns and fluctuations in the data.
The longitudinal balanced data profile was compiled into subgroup
... Show MoreThe research aims to presenting a number of scenarios for the investment of the marshes. The problem of research problem was that there is no in-depth analysis of the marshes environment. The traditional methods of the environmental analysis are insufficient. The research community is represented by the decision makers in Maysan Governorate. The research led to proposing of three scenarios with statement the requirements for the success of each one. The most important conclusions are that the three proposed scenarios for marshes investment depend on the availability of the required volunteers for each scenario. The higher the availability of the requirements, the more optimistic the scenario becomes. If t
... Show MoreThe study aims to display the scientific benefit offered by modern electronic programs for various scientific research methods, while determining the positive scientific role played by these programs in modernizing the methodologies and logic of scientific thinking, especially with the rapid development of the sciences and their curricula.
These programs link accurately with scientific results. The importance of the study is to provide practical mechanisms to highlight the scientific projection of the electronic programs in various steps of scientific research.
A case study was used for Tropes version 8.4, which analyzes written, audio and visual semantic texts and presents a set of statistical results that facilitate the difficult
Automatic Programming Assessment (APA) has been gaining lots of attention among researchers mainly to support automated grading and marking of students’ programming assignments or exercises systematically. APA is commonly identified as a method that can enhance accuracy, efficiency and consistency as well as providing instant feedback on students’ programming solutions. In achieving APA, test data generation process is very important so as to perform a dynamic testing on students’ assignment. In software testing field, many researches that focus on test data generation have demonstrated the successful of adoption of Meta-Heuristic Search Techniques (MHST) so as to enhance the procedure of deriving adequate test data for efficient t
... Show More