Unmanned aerial vehicles (UAVs) can provide valuable spatial information products for many projects across a wide range of applications. One of the major challenges in this discipline is the quality of positioning accuracy of the resulting mapping products in professional photogrammetric projects. This is especially true when using low-cost UAV systems equipped with GNSS receivers for navigation. In this study, the influence of UAV flight direction and camera orientation on positioning accuracy in an urban area on the west bank of the Euphrates river in Iraq was investigated. Positioning accuracy was tested in this study with different flight directions and camera orientation settings using a UAV autopilot app (Pix4Dcapture software (Ver. 4.11.0)). The different combinations of these two main parameters (camera orientation and flight direction) resulted in 11 different flight cases for which individual planimetric and vertical accuracies were evaluated. Eleven flight sets of dense point clouds, DEMs, and ortho-imagery were created in this way to compare the achieved positional accuracies. One set was created using the direct georeferencing method (without using GCPs), while the other ten sets were created using the indirect georeferencing approach based on ground truth measurements of five artificially created GCPs. Positional accuracy was found to vary depending on the user-defined flight plan settings, despite an approximately constant flight altitude. However, it was found that the horizontal accuracy achieved was better than the vertical accuracy for all flight sets. This study revealed that combining multiple sets of images with different flight directions and camera orientations can significantly improve the overall positional accuracy to reach several centimeters.
The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreAutomatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show More<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreThe current research aims to adopt production quality decisions as the most important decisions , because they are accompanied by customer satisfaction through monitoring the quality of drinking water in iraq which reach through the pipeline network associated with water treatment projects of Tigris and Euphrates rivers. One of the indicators of quality control was the drawing of the C-chart by specifying the central line and the upper and lower limit of the control and the diagnosis of whether the production system as a whole within the scope of quality control or not and determine the strength and significance of the correlation between the quantities of water And actual needs for customers , the research has reached a number o
... Show MoreConstruction projects need methods and techniques to ensure the level of quality and commensurate with the level required and documented in the project contract. The quality of the project is affected by the quality of the inputs and accompanying procedures in the construction of the project.
Al-Rumaitha residential project found that the quality of the concrete for the ceilings in the research sample (the roof of the third floor of buildings A25 and A26) and (roof of the second floor of buildings A27, A28, A29, A30, A31, A32 and A33) and roof of buildings A15 and A16 A19)) is not the required quality level.
The idea of the research came after the need to improve the performance o
... Show MoreBackground: For decades, the use of naturally accessible materials in treating human disease has been widespread. The goal of this study was to determine the anti-fungal effectiveness /of the lemongrass essential oil (LGEO) versus Candida albicans (C. albicans) adhesion to polymethylmethacrylate (PMMA) materials. Material and methods: LGEO's anti-fungal activity was tested against C. albicans adhesion using the following concentration of LGEO in PMMA monomer (2.5 vol. %, 5 vol. % LGEO) selected from the pilot study as the best two effective concentrations. A total of 40 specimens were fabricated for the candida adherence test and were subdivided into four equal groups: negative control 0 vol. % addition, experimental with 2.5 vol. % and
... Show MoreSecurity concerns in the transfer of medical images have drawn a lot of attention to the topic of medical picture encryption as of late. Furthermore, recent events have brought attention to the fact that medical photographs are constantly being produced and circulated online, necessitating safeguards against their inappropriate use. To improve the design of the AES algorithm standard for medical picture encryption, this research presents several new criteria. It was created so that needs for higher levels of safety and higher levels of performance could be met. First, the pixels in the image are diffused to randomly mix them up and disperse them all over the screen. Rather than using rounds, the suggested technique utilizes a cascad
... Show MoreAlthough its wide utilization in microbial cultures, the one factor-at-a-time method, failed to find the true optimum, this is due to the interaction between optimized parameters which is not taken into account. Therefore, in order to find the true optimum conditions, it is necessary to repeat the one factor-at-a-time method in many sequential experimental runs, which is extremely time-consuming and expensive for many variables. This work is an attempt to enhance bioactive yellow pigment production by Streptomyces thinghirensis based on a statistical design. The yellow pigment demonstrated inhibitory effects against Escherichia coli and Staphylococcus aureus and was characterized by UV-vis spectroscopy which showed lambda maximum of
... Show More
The aim of the research is to identify the effect of instructional design according to Kagan structure among the first intermediate school student’s, and how skills could help in generating information in mathematics. In accordance with the research objectives, the researcher has followed the experimental research method by adopting an experimental design with two equivalent groups of post-test to measure skills in generating information. Accordingly, the researcher raised two main null hypotheses: there were no statistically significant differences at the level of significance (0.05) between the average scores of the experimental group who studied the material according to Kagan structure and th
... Show More