One wide-ranging category of open source data is that referring to geospatial information web sites. Despite the advantages of such open source data, including ease of access and cost free data, there is a potential issue of its quality. This article tests the horizontal positional accuracy and possible integration of four web-derived geospatial datasets: OpenStreetMap (OSM), Google Map, Google Earth and Wikimapia. The evaluation was achieved by combining the tested information with reference field survey data for fifty road intersections in Baghdad, Iraq. The results indicate that the free geospatial data can be used to enhance authoritative maps especially small scale maps.
E-Health care system is one of the great technology enhancements via using medical devices through sensors worn or implanted in the patient's body. Wireless Body Area Network (WBAN) offers astonishing help through wireless transmission of patient's data using agreed distance in which it keeps patient's status always controlled by regular transmitting of vital data indications to the receiver. Security and privacy is a major concern in terms of data sent from WBAN and biological sensors. Several algorithms have been proposed through many hypotheses in order to find optimum solutions. In this paper, an encrypting algorithm has been proposed via using hyper-chaotic Zhou system where it provides high security, privacy, efficiency and
... Show MoreData centric techniques, like data aggregation via modified algorithm based on fuzzy clustering algorithm with voronoi diagram which is called modified Voronoi Fuzzy Clustering Algorithm (VFCA) is presented in this paper. In the modified algorithm, the sensed area divided into number of voronoi cells by applying voronoi diagram, these cells are clustered by a fuzzy C-means method (FCM) to reduce the transmission distance. Then an appropriate cluster head (CH) for each cluster is elected. Three parameters are used for this election process, the energy, distance between CH and its neighbor sensors and packet loss values. Furthermore, data aggregation is employed in each CH to reduce the amount of data transmission which le
... Show MoreThe research aims at demonstrating the role of the formulation of the green strategy in adopting the areas of the green strategy at the level of jobs in the municipal institutions in the province of Babylon, specifically the Directorate of the municipality of Hilla. The most important areas related to the green strategy were highlighted directly or indirectly, after the indicators of environmental damage emerged from the actions of companies and institutions. The research included a sample size of 222 individual of municipal institutions with different job titles and specializations between the technical and administrative and different levels of academic achievement within the institutions within the Ministry of Construction, Ho
... Show MoretA novel synthesis procedure is presented for preparing triethanolamine-treated graphene nanoplatelets(TEA-GNPs) with different specific areas (SSAs). Using ultrasonication, the covalently functionalizedTEA-GNPs with different weight concentrations and SSAs were dispersed in distilled water to prepareTEA-GNPs nanofluids. A simple direct coupling of GNPs with TEA molecules is implemented to synthesizestable water-based nanofluids. The effectiveness of the functionalization procedure was validated by thecharacterization and morphology tests, i.e., FTIR, Raman spectroscopy, EDS, and TEM. Thermal conduc-tivity, dispersion stability, and rheological properties were investigated. Using UV–vis spectrometer, ahighest dispersion stability of 0.876
... Show MoreDocument source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show More