To date, comprehensive reviews and discussions of the strengths and limitations of Remote Sensing (RS) standalone and combination approaches, and Deep Learning (DL)-based RS datasets in archaeology have been limited. The objective of this paper is, therefore, to review and critically discuss existing studies that have applied these advanced approaches in archaeology, with a specific focus on digital preservation and object detection. RS standalone approaches including range-based and image-based modelling (e.g., laser scanning and SfM photogrammetry) have several disadvantages in terms of spatial resolution, penetrations, textures, colours, and accuracy. These limitations have led some archaeological studies to fuse/integrate multiple RS datasets to overcome limitations and produce comparatively detailed outcomes. However, there are still knowledge gaps in examining the effectiveness of these RS approaches in enhancing the detection of archaeological remains/areas. Thus, this review paper is likely to deliver valuable comprehension for archaeological studies to fill knowledge gaps and further advance exploration of archaeological areas/features using RS along with DL approaches.
In this paper, a new technique is offered for solving three types of linear integral equations of the 2nd kind including Volterra-Fredholm integral equations (LVFIE) (as a general case), Volterra integral equations (LVIE) and Fredholm integral equations (LFIE) (as special cases). The new technique depends on approximating the solution to a polynomial of degree and therefore reducing the problem to a linear programming problem(LPP), which will be solved to find the approximate solution of LVFIE. Moreover, quadrature methods including trapezoidal rule (TR), Simpson 1/3 rule (SR), Boole rule (BR), and Romberg integration formula (RI) are used to approximate the integrals that exist in LVFIE. Also, a comparison between those methods i
... Show MoreThe various properties of the ground and excited electronic states of coumarins 102 using density functional theory (DFT) and time-dependent density functional theory (TDDFT) was calculated by the B3LYP density functional model with 6-31G(d,p) basis set by Gaussian 09 W program. Spectral characteristics of coumarin102 have been probed into by methods of experimental UV-visible, and quantum chemistry. The UV spectrum was measured in methanol. The optimized structures, total energies, electronic states (HOMO- LUMO), energy gap, ionization potentials, electron affinities, chemical potential, global hardness, softness, global electrophilictity, and dipole moment were measured. We find good agreement between experimental data of UV spectrum and
... Show MoreThe influence and hazard of fire flame are one of the most important parameters that affecting the durability and strength of structural members. This research studied the influence of fire flame on the behavior of reinforced concrete beams affected by repeated load. Nine self- compacted reinforced concrete beams were castellated, all have the same geometric layout (0.15x0.15x1.00) m, reinforcement details and compressive strength (50 Mpa).
To estimate the effect of fire flame disaster, four temperatures were adopted (200, 300, 400 and 500) oC and two method of cooling were used (graduated and sudden). In the first cooling method, graduated, the tested beams were leaved to cool in air while in the seco
... Show MoreA total of 680 fish specimens belonging to 31 species from the Yemeni coastal waters of the Red Sea were inspected for the isopod infestations. Four isopod species belonging to three families of the suborder Cymothoida were detected. These are: Aega psora (Linnaeus, 1758) from Lethrinus lentjan, Natatolana insignis Hobbins and Jones, 1993 from Abalistes stellatus, Excorallana tricornis (Hansen, 1890) from Epinephelus fuscoguttatus, E. guttatus and E. tauvina and Alcirona krebsi Hansen, 1890 from Epinephelus microdon. All these isopod species are reported here for the first time from the Yemeni coastal waters of the Red Se
... Show MoreBackground and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show MoreThis paper investigates the experimental response of composite reinforced concrete with GFRP and steel I-sections under limited cycles of repeated load. The practical work included testing four beams. A reference beam, two composite beams with pultruded GFRP I-sections, and a composite beam with a steel I-beam were subjected to repeated loading. The repeated loading test started by loading gradually up to a maximum of 75% of the ultimate static failure load for five loading and unloading cycles. After that, the specimens were reloaded gradually until failure. All test specimens were tested under a three-point load. Experimental results showed that the ductility index increased for the composite beams relative to the reference specim
... Show MoreThe current study presents the simulative study and evaluation of MANET mobility models over UDP traffic pattern to determine the effects of this traffic pattern on mobility models in MANET which is implemented in NS-2.35 according to various performance metri (Throughput, AED (Average End-2-end Delay), drop packets, NRL (Normalize Routing Load) and PDF (Packet Delivery Fraction)) with various parameters such as different velocities, different environment areas, different number of nodes, different traffic rates, different traffic sources, different pause times and different simulation times . A routing protocol.…was exploited AODV(Adhoc On demand Distance Vector) and RWP (Random Waypoint), GMM (Gauss Markov Model), RPGM (Refere
... Show More