Preferred Language
Articles
/
zBc_WZABVTCNdQwCuYff
Combining Remote Sensing Approaches for Detecting Marks of Archaeological and Demolished Constructions in Cahokia’s Grand Plaza, Southwestern Illinois
...Show More Authors

Remote sensing data are increasingly being used in digital archaeology for the potential non-invasive detection of archaeological remains. The purpose of this research is to evaluate the capability of standalone (LiDAR and aerial photogrammetry) and integration/fusion remote sensing approaches in improving the prospecting and interpretation of archaeological remains in Cahokia’s Grand Plaza. Cahokia Mounds is an ancient area; it was the largest settlement of the Mississippian culture located in southwestern Illinois, USA. There are a limited number of studies combining LiDAR and aerial photogrammetry to extract archaeological features. This article, therefore, combines LiDAR with photogrammetric data to create new datasets and investigate whether the new data can enhance the detection of archaeological/ demolished structures in comparison to the standalone approaches. The investigations are implemented based on the hillshade, gradient, and sky view factor visual analysis techniques, which have various merits in revealing topographic features. The outcomes of this research illustrate that combining data derived from different sources can not only confirm the detection of remains but can also reveal more remains than standalone approaches. This study demonstrates that the use of combination remote sensing approaches provides archaeologists with another powerful tool for site analysis.

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jun 03 2018
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Investigation of Solubility Enhancement Approaches of Ticagrelor
...Show More Authors

ABSTRACT

                   Ticagrelor is an orally administered antiplatelet medicine, direct-acting P2Y12-receptor antagonist. Ticagrelor binds reversibly and noncompetitively to the P2Y12 receptor at a site distinct from that of the endogenous agonist adenosine diphosphate (ADP). Inhibition of platelet aggregation stimulated by ADP is a commonly used pharmacodynamic parameter for P2Y12-receptor antagonists.

                  Ticagrelor is a crystalline powder with an aqueous solubility of approximately 10?g/mL at room temperature.

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Crossref
Publication Date
Mon May 15 2023
Journal Name
Iraqi Journal Of Science
Shedding Further Light on Upper Cretaceous – Neogene Subsurface Lithostratigraphy of Southwestern Iraq
...Show More Authors

Exploratory activities carried out by oil companies in the latter half of the past
century proved the existence of voluminous reserve of oil and gas in the
southwestern area of Iraq. In view of this, it seemed more than prudent to add a new
knowledge to that currently existing about the subsurface lithostratigraphy of this
area. As a first step in fulfilling this mission, this paper will attempt to do so by
covering the time interval from the Upper Cretaceous to the Neogene. In turn, this
effort had entailed both the description of about 4707 metres of fully recovered
cores, plus the subjection of more than 4000 samples to existing petrologic analyses.
Findings worth mentioning does include the observation that wi

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 01 2020
Journal Name
Journal Of Engineering
New Approaches of Cloud Services Access using Tonido Cloud Server for Real-Time Applications
...Show More Authors

A Tonido cloud server provides a private cloud storage solution and synchronizes customers and employees with the required cloud services over the enterprise. Generally, access to any cloud services by users is via the Internet connection, which can face some problems, and then users may encounter in accessing these services due to a weak Internet connection or heavy load sometimes especially with live video streaming applications overcloud. In this work, flexible and inexpensive proposed accessing methods are submitted and implemented concerning real-time applications that enable users to access cloud services locally and regionally. Practically, to simulate our network connection, we proposed to use the Raspberry-pi3 m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Nov 29 2021
Journal Name
Iraqi Journal Of Science
Comparing the Main Approaches of Image Segmentation
...Show More Authors

Images are important medium for conveying information; this makes improvement of image processing techniques also important. Interpretation of image content is one of the objectives of image processing techniques. Image interpretation that segments the image to number of objects called image segmentation. Image segmentation is an important field to deal with the contents of images and get non overlapping regions coherent in texture and color, it is important to deal only with objects with significant information. This paper presents survey of the most commonly used approaches of image segmentation and the results of those approaches have been compared and according to the measurement of quality presented in this paper the Otsu's threshol

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 11 2023
Journal Name
Applied Sciences
A Preliminary Study and Implementing Algorithm Using Finite State Automaton for Remote Identification of Drones
...Show More Authors

Electronic remote identification (ER-ID) is a new radio frequency (RF) technology that is initiated by the Federal Aviation Authorities (FAA). For security reasons, traffic control, and so on, ER-ID has been applied for drones by the FAA to enable them to transmit their unique identification and location so that unauthorized drones can be identified. The current limitation of the existing ER-ID algorithms is that the application is limited to the Wi-Fi and Bluetooth wireless controllers, which results in a maximum range of 10–20 m for Bluetooth and 50–100 m for Wi-Fi. In this study, a mathematical computing technique based on finite state automaton (FSA) is introduced to expand the range of the ER-ID RF system and reduce the ene

... Show More
View Publication
Scopus (2)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
The Arithmetic Coding and Hybrid Discrete Wavelet and Cosine Transform Approaches in Image Compression
...Show More Authors

Image compression is one of the data compression types applied to digital images in order to reduce their high cost for storage and/or transmission. Image compression algorithms may take the benefit of visual sensitivity and statistical properties of image data to deliver superior results in comparison with generic data compression schemes, which are used for other digital data. In the first approach, the input image is divided into blocks, each of which is 16 x 16, 32 x 32, or 64 x 64 pixels. The blocks are converted first into a string; then, encoded by using a lossless and dictionary-based algorithm known as arithmetic coding. The more occurrence of the pixels values is codded in few bits compare with pixel values of less occurre

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Thu Aug 30 2018
Journal Name
Iraqi Journal Of Science
Construct a New System as a Combining Function for the LFSR in the Stream Cipher Systems Using Multiplicative Cyclic Group
...Show More Authors

In this paper, we construct a new mathematical system as Multiplicative Cyclic Group (MCG), called a New Digital Algebraic Generator (NDAG) Unit, which would generate digital sequences with good statistical properties. This new Unit can be considered as a new basic unit of stream ciphers.

A (NDAG) system can be constructed from collection of (NDAG) units using a Boolean function as a combining function of the system. This system could be used in cryptography as like as Linear Feedback Shift Register (LFSR) unit. This unit is basic component of  a stream cipher system.

View Publication Preview PDF
Publication Date
Thu Dec 29 2022
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
Combinatorial Testing Approaches: A Systematic Review
...Show More Authors

Testing is a vital phase in software development, and having the right amount of test data is an important aspect in speeding up the process. As a result of the integrationist optimization challenge, extensive testing may not always be practicable. There is also a shortage of resources, expenses, and schedules that impede the testing process. One way to explain combinational testing (CT) is as a basic strategy for creating new test cases. CT has been discussed by several scholars while establishing alternative tactics depending on the interactions between parameters. Thus, an investigation into current CT methods was started in order to better understand their capabilities and limitations. In this study, 97 publications were evalua

... Show More
View Publication
Crossref
Publication Date
Tue Sep 10 2024
Journal Name
Journal Of Mathematics And Computer Science
The role of human shield in prey‎, ‎crop-raiders and top predator species in southwestern Ethiopia's coffee forests‎: ‎a modeling study
...Show More Authors

In this work, we have developed a model that describes the relationships between top predators (such as tigers, hyenas, and others), crop raiders (such as baboons, warthogs, and deer), and prey (such as deer) in the coffee forests of southwest Ethiopia. Various potential equilibrium points are identified. Additionally, the model's stability in the vicinity of these equilibrium points is examined. An investigation of the model's Hopf bifurcation is conducted concerning several significant parameters. It is found that prey species may be extinct due to a lower growth rate and consumption by top predators in the absence of human interference in the carrying capacity of prey. It is observed that top predators may be extinct due to human interfe

... Show More
View Publication