Preferred Language
Articles
/
fxeKapIBVTCNdQwCoK9a
Ten Years of OpenStreetMap Project: Have We Addressed Data Quality Appropriately? – Review Paper
...Show More Authors

It has increasingly been recognised that the future developments in geospatial data handling will centre on geospatial data on the web: Volunteered Geographic Information (VGI). The evaluation of VGI data quality, including positional and shape similarity, has become a recurrent subject in the scientific literature in the last ten years. The OpenStreetMap (OSM) project is the most popular one of the leading platforms of VGI datasets. It is an online geospatial database to produce and supply free editable geospatial datasets for a worldwide. The goal of this paper is to present a comprehensive overview of the quality assurance of OSM data. In addition, the credibility of open source geospatial data is discussed, highlighting the difficulties and challenges of VGI data quality assessment. The conclusion is that for OSM dataset, it is quite difficult to control its quality. It therefore makes sense to use OSM data for applications do not need high quality spatial datasets.        

Crossref
Publication Date
Mon Mar 15 2021
Journal Name
Journal Of Baghdad College Of Dentistry
Prevalence of self-reported halitosis and associated factors in 15 years old male students in Karbala City-Iraq
...Show More Authors

Background׃ Halitosis is a common condition and is most often caused by a buildup of bacteria in the mouth because of gum disease, food, or plaque. It can result in anxiety among those affected, it is also associated with depression and symptoms of obsessive compulsive disorder. The aim of this study isto assess the prevalence of self-reported halitosis and associated factors (dental plaque, gingival condition and dental caries) in 15 years old male students in Karbala city in Iraq. Additionally, we studied adolescents’ concern with their own breath and whether anyone had ever told them that they had halitosis. Methods׃ A cross sectional observational survey was conducted to15 years old high school students from public and p

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Epidemiological and Multidrug Resistance Study for E. coli Isolated from Urinary Tract Infection (Three Years of Study)
...Show More Authors

Uropathogenic E. coli (UPEC) is problematic and still the leading cause of urinary tract infections worldwide. It is developed resistance against most antibiotics. The investigation, surveillance system, and efficient strategy will facilitate selecting an appropriate treatment that could control the bacterial distribution. The present study aims to investigate the epidemiology and associated risk factors of uropathogenic E. coli and to study their antibiotic resistance patterns. 1585 midstream urine specimens were collected from symptomatic urinary tract infections (UTI) patients (225 males and 1360 females) admitted to Zakho emergency hospital, Zakho, Kurdistan Region, Iraq from January 2016 until the end of December 2

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Sep 29 2025
Journal Name
Revista Iberoamericana De Psicología Del Ejercicio Y El Deporte, Issn 1886-8576, Vol. 17, Nº. 6, 2022, Págs. 399-401
Aggressive Behavior And Its Relationship To The Phenomenon Of Bullying Among Young Football Players Aged (17-19) Years
...Show More Authors

Autorías: Muwafaq Obayes Khudhair, Hayder Talib Jasim, Ahmed Thare Hani. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 6, 2022. Artículo de Revista en Dialnet.

View Publication Preview PDF
Publication Date
Mon Sep 29 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Distribution of tooth wear among institutionalized residents (50-89 years old) in Baghdad city\ Iraq (Cross-sectional study)
...Show More Authors

Background: Tooth wear is one of the most common problems in the older dentate population which results from the interaction of three processes (attrition, abrasion and erosion) and it affects all societies, different age groups, and all cultures. This study was achieved to evaluate the prevalence and distribution of tooth wear among institutionalized residents in Baghdad city\ Iraq. Subjects and Methods: This survey was accomplished on four private and one governmental institution in Baghdad city. One-hundred twenty three (61 males, 62 females) aged 50-89 years were participated in this study. The diagnosis and recording of tooth wear were according to criteria of Smith and Knight. Results: The prevalence of tooth wear was 100% with a mean

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 01 2008
Journal Name
2008 First International Conference On Distributed Framework And Applications
A strategy for Grid based t-way test data generation
...Show More Authors

View Publication
Scopus (22)
Crossref (16)
Scopus Crossref
Publication Date
Fri Jan 01 2010
Journal Name
International Journal Of Advanced Intelligence Paradigms
Assessing IRPS as an efficient pairwise test data generation strategy
...Show More Authors

View Publication
Scopus (10)
Crossref (9)
Scopus Crossref
Publication Date
Wed Aug 25 2021
Journal Name
2021 7th International Conference On Contemporary Information Technology And Mathematics (iccitm)
Anomaly Detection in Flight Data Using the Naïve Bayes Classifier
...Show More Authors

View Publication
Scopus (8)
Crossref (6)
Scopus Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure
...Show More Authors

With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security.  This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Jul 22 2023
Journal Name
Journal Of Engineering
Data Acquisition System for Wind Speed, Direction and Temperature Measurements
...Show More Authors

This paper describes the use of microcomputer as a laboratory instrument system. The system is focused on three weather variables measurement, are temperature, wind speed, and wind direction. This instrument is a type of data acquisition system; in this paper we deal with the design and implementation of data acquisition system based on personal computer (Pentium) using Industry Standard Architecture (ISA)bus. The design of this system involves mainly a hardware implementation, and the software programs that are used for testing, measuring and control. The system can be used to display the required information that can be transferred and processed from the external field to the system. A visual basic language with Microsoft foundation cl

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
The Factors Affecting on Managing Sensitive Data in Cloud Computing
...Show More Authors

Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref