Preferred Language
Articles
/
joe-3041
SIMULATION MODEL FOR THE ASSESSMENT OF DIRECT AND INDIRECT GEOREFERENCING TECHNIQUES IN ANALYTICAL PHOTOGRAMMETRY
...Show More Authors

This paper compares between the direct and indirect georeferencing techniques in Photogrammetry bases on a simulation model. A flight plan is designed which consists of three strips with nine overlapped images for each strip by a (Canon 500D) digital camera with a resolution of 15 Mega Pixels.

 

The triangulation computations are carried out by using (ERDAS LPS) software, and the direct measurements are taken directly on the simulated model to substitute using GPS/INS in real case. Two computational tests have been implemented to evaluate the positional accuracy for the whole model and the Root Mean Square Error (RMSE) relating to (30) check points show that the indirect georeferencing is more accurate than the direct georeferencing. The computed RMSE of indirect georeferencing technique are (±0.0686 m., ± 0.0402 m.±, 0.3583 m.) in (X, Y, Z) respectively, while by direct georeferencing technique are (±0.1274 m., ± 0.1220 m., ± 0.5132 m.) in (X, Y, Z) respectively. Finally, the aim of this paper can be summarized as investigating the possibilities of using a simulation model to evaluate the applicability of direct and indirect georeferencing and analyzing the accuracy of both techniques.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 31 2019
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Behavior of Clay Masonry Prism under Vertical Load Using Detailed Micro Modeling Approach
...Show More Authors

The aim of this research is to assess the validity of Detailed Micro-Modeling (DMM) as a numerical model for masonry analysis. To achieve this aim, a set of load-displacement curves obtained based on both numerical simulation and experimental results of clay masonry prisms loaded by a vertical load. The finite element method was implemented in DMM for analysis of the experimental clay masonry prism. The finite element software ABAQUS with implicit solver was used to model and analyze the clay masonry prism subjected to a vertical load. The load-displacement relationship of numerical model was found in good agreement with those drawn from experimental results. Evidence shows that load-displacement curvefound from the finite element m

... Show More
Crossref (1)
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Antibacterial Activity Of ternary semiconductor compounds AgInSe2 Nanoparticles Synthesized by Simple Chemical Method
...Show More Authors

View Publication
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Nov 30 2024
Journal Name
Iraqi Journal Of Science
Admissible Classes of Seven-Parameter Mittag-Leffler Operatorwith Third-Order Differential Subordination Properties
...Show More Authors

The main purpose of this paper, is to characterize new admissible classes of linear operator in terms of seven-parameter Mittag-Leffler function, and discuss sufficient conditions in order to achieve certain third-order differential subordination and superordination results. In addition, some linked sandwich theorems involving these classes had been obtained.  

View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Oct 31 2013
Journal Name
Al-khwarizmi Engineering Journal
Aeroelastic Behavior of a Wind Turbine Blade by a Fluid -Structure Interaction Analysis
...Show More Authors

In this paper, a numerical model for fluid-structure interaction (FSI) analysis is developed for investigating the aeroelastic response of a single wind turbine blade. The Blade Element Momentum (BEM) theory was adopted to calculate the aerodynamic forces considering the effects of wind shear and tower shadow. The wind turbine blade was modeled as a rotating cantilever beam discretized using Finite Element Method (FEM) to analyze the deformation and vibration of the blade. The aeroelastic response of the blade was obtained by coupling these aerodynamic and structural models using a coupled BEM-FEM program written in MATLAB. The governing FSI equations of motion are iteratively calculated at each time step, through exchanging data between

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 08 2002
Journal Name
Iraqi Journal Of Laser
Cross-focusing Effect of Two Intense Laser Beams on Electron Plasma Wave Excitation
...Show More Authors

This paper presents the effect of relativistic and ponderomotive nonlinearity on cross-focusing of two intense laser beams in a collisionless and unmagnetized plasma. It should be noted here that while considering the self-focusing due to relativistic electron mass variation, the electron ponderomotive density depression in the channel may also be important. Therefore/these two nonlinearties may simultaneously affect the self-focusing process. These nonlinearities depend not only on the intensity of one laser but also on the second laser. Therefore, one laser beam affects the dynamics of the second beam and hence the process of cross-focusing takes place. The electric field amplitude of the excited electron plasma wave (EPW) has been cal

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 05 2024
Journal Name
5th International Conference On Biomedical And Health Sciences
Antimicrobial Activity Zinc Oxide ZnO Nanoparticles Against Biofilm Formation of Uropathogenic E. coli
...Show More Authors

Preview PDF
Publication Date
Mon Jun 30 2014
Journal Name
Al-kindy College Medical Journal
Is Elective Interval Appendicectomy after Successful Initial Conservative Management of Appendicular Mass Necessary?
...Show More Authors

Background The traditional management of appendicular mass is an initial conservative treatment followed by interval appendectomy. Recently interval appendicectomy has been questioned.
Objective: The purpose of this study was to clarify the need and the role of interval appendicectomy after successful initial conservative treatment.
Method: This is a prospective study conducted in a major hospital in Basra from April 2006 to Septemper2010, included 65 patients with appendicular mass which subsequently proved postinflammmatory (phlegmonous) changes of the appendix were treated conservatively.
Results: Routine interval appendicectomy was not performed and needed after successful treatment in the majority of the patients (84.6%). F

... Show More
View Publication Preview PDF
Publication Date
Fri May 01 2020
Journal Name
Civil Engineering Journal
Post-Fire Behavior of Post-Tensioned Segmental Concrete Beams under Monotonic Static Loading
...Show More Authors

This paper presents a study to investigate the behavior of post-tensioned segmental concrete beams that exposed to high-temperature. The experimental program included fabricating and testing twelve simply supported beams that divided into three groups depending on the number of precasting concrete segments. All specimens were prepared with an identical length of 3150 mm and differed in the number of the incorporated segments of the beam (9, 7, or 5 segments). To simulate the genuine fire disasters, nine out of twelve beams were exposed to a high-temperature flame for one hour. Based on the standard fire curve (ASTM – E119), the temperatures of 300◦C (572◦F), 500◦C (932◦F), and 700◦C (1292◦F) were adopted. Consequently,

... Show More
Crossref (1)
Crossref
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Tue May 21 2019
Journal Name
The Journal Of Engineering
Performance of a tubular machine driven by an external‐combustion free‐piston engine
...Show More Authors

Crossref (2)
Clarivate Crossref