Preferred Language
Articles
/
thaNZIgBVTCNdQwCoXYo
Sensor Data Classification for the Indication of Lameness in Sheep
...Show More Authors

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Gis Research Uk 24th Annual Conference
Comparing Open Source Map Data in Areas Lacking Authoritative Mapping
...Show More Authors

One wide-ranging category of open source data is that referring to geospatial information web sites. Despite the advantages of such open source data, including ease of access and cost free data, there is a potential issue of its quality. This article tests the horizontal positional accuracy and possible integration of four web-derived geospatial datasets: OpenStreetMap (OSM), Google Map, Google Earth and Wikimapia. The evaluation was achieved by combining the tested information with reference field survey data for fifty road intersections in Baghdad, Iraq. The results indicate that the free geospatial data can be used to enhance authoritative maps especially small scale maps.

Publication Date
Fri Oct 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Monitoring Pollution and the Trend of Air Quality in Brick Factories in the Nahrawan Region and its Impact on Baghdad, Using Remote Sensing Data
...Show More Authors

One of the most significant environmental issues facing the planet today is air pollution. Due to development in industry and population density, air pollution has lately gotten worse. Like many developing nations, Iraq suffers from air pollution, particularly in its urban areas with heavy industry. Our research was carried out in Baghdad's Al-Nahrawan neighbourhood. Recently, ground surveys and remote sensing were used to study the monitoring of air pollution. In order to extract different gaseous and particle data, Earth Data source, Google Earth Engine (GEE), and Geographic Information Systems (GIS) software were all employed. The findings demonstrated that there is a significant positive connection between data collected by ground-ba

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Implementation of Transmitter Zigbee System based on Wireless Sensor Network of IEEE 802.15.4 Standard
...Show More Authors

Abstract

 

Zigbee is considered to be one of the wireless sensor networks (WSNs) designed for short-range communications applications. It follows IEEE 802.15.4 specifications that aim to design networks with lowest cost and power consuming in addition to the minimum possible data rate. In this paper, a transmitter Zigbee system is designed based on PHY layer specifications of this standard. The modulation technique applied in this design is the offset quadrature phase shift keying (OQPSK) with half sine pulse-shaping for achieving a minimum possible amount of phase transitions. In addition, the applied spreading technique is direct sequence spread spectrum (DSSS) technique, which has

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Mar 28 2020
Journal Name
Iraqi Journal Of Science
Image Classification Schemes Based on Sliced Radial Energy Distribution of DFT and the Statistical Moments of Haar Wavelet
...Show More Authors

Texture recognition is used in various pattern recognition applications and texture classification that possess a characteristic appearance. This research paper aims to provide an improved scheme to provide enhanced classification decisions and to decrease processing time significantly. This research studied the discriminating characteristics of textures by extracting them from various texture images using discrete Haar transform (DHT) and discrete Fourier transform DFT. Two sets of features are proposed; the first set was extracted using the traditional DFT, while the second used DHT. The features from the Fourier domain are calculated using the radial distribution of spectra, while for those extracted from Haar Wavelet the statistical

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Hiding Data in Color Image Using Least Significant Bits of Blue Sector
...Show More Authors

Publication Date
Tue Nov 10 2020
Journal Name
International Journal Of Psychosocial Rehabilitation
Hybridization Methodology of ARMA-FIGARCH Model to Examine Gasoline Data in Iraq
...Show More Authors

Preview PDF
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Hiding Data in Color Image Using Least Significant Bits of Blue Sector
...Show More Authors

Concealing the existence of secret hidden message inside a cover object is known as steganography, which is a powerful technique. We can provide a secret communication between sender and receiver using Steganography. In this paper, the main goal is for hiding secret message into the pixels using Least Significant Bit (LSB) of blue sector of the cover image. Therefore, the objective is by mapping technique presenting a model for hiding text in an image. In the model for proposing the secret message, convert text to binary also the covering (image) is divided into its three original colors, Red, Green and Blue (RGB) , use the Blue sector convert it to binary,  hide two bits from the message in  two bits of the least significant b

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Treatment Missing Data of Daily and Monthly Air Temperature in Iraq by Using Mean Method
...Show More Authors

Frequent data in weather records is essential for forecasting, numerical model development, and research, but data recording interruptions may occur for various reasons. So, this study aims to find a way to treat these missing data and know their accuracy by comparing them with the original data values. The mean method was used to treat daily and monthly missing temperature data. The results show that treating the monthly temperature data for the stations (Baghdad, Hilla, Basra, Nasiriya, and Samawa) in Iraq for all periods (1980-2020), the percentage for matching between the original and the treating values did not exceed (80%). So, the period was divided into four periods.  It was noted that most of the congruence values increased, re

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of weighted estimated method and proposed method (BEMW) for estimation of semi-parametric model under incomplete data
...Show More Authors

Generally, statistical methods are used in various fields of science, especially in the research field, in which Statistical analysis is carried out by adopting several techniques, according to the nature of the study and its objectives. One of these techniques is building statistical models, which is done through regression models. This technique is considered one of the most important statistical methods for studying the relationship between a dependent variable, also called (the response variable) and the other variables, called covariate variables. This research describes the estimation of the partial linear regression model, as well as the estimation of the “missing at random” values (MAR). Regarding the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
IMPROVED STRUCTURE OF DATA ENCRYPTION STANDARD ALGORITHM
...Show More Authors

The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene

... Show More