Preferred Language
Articles
/
joe-787
  Positional Accuracy Assessment for Updating Authoritative Geospatial Datasets Based on Open Source Data and Remotely Sensed Images
...Show More Authors

OpenStreetMap (OSM) represents the most common example of online volunteered mapping applications. Most of these platforms are open source spatial data collected by non-experts volunteers using different data collection methods. OSM project aims to provide a free digital map for all the world. The heterogeneity in data collection methods made OSM project databases accuracy is unreliable and must be dealt with caution for any engineering application. This study aims to assess the horizontal positional accuracy of three spatial data sources are OSM road network database, high-resolution Satellite Image (SI), and high-resolution Aerial Photo (AP) of Baghdad city with respect to an analogue formal road network dataset obtained from the Mayoralty of Baghdad (MB). The methodology of, U.S. National Standard Spatial Data Accuracy (NSSDA) was applied to measure the degree of agreement between each data source and the formal dataset (MB) in terms of horizontal positional accuracy by computing RMSE and NSSDA values. The study concluded that each of the three data sources does not agree with the MB dataset in both study sites AL-Aadhamiyah and AL-Kadhumiyah in terms of positional accuracy.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Intelligent Systems
A study on predicting crime rates through machine learning and data mining using text
...Show More Authors
Abstract<p>Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o</p> ... Show More
View Publication
Scopus (11)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding Information Using different lighting Color images
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Fri Sep 15 2023
Journal Name
Al-academy
The aesthetic images in Mohammed Thanoun graphic
...Show More Authors

The tagged search (The aesthetic images in Mohammed Thanoun graphic) four chapters, Chapter I was concerned the statement of the research problem, the research importance and it’s needed, the goal of research in identifying the aesthetic images in the graphic of the artist's, the research limits, and identifying the most important terms, chapter II came with theoretical framework and included three chapters: chapter I was interested in the aesthetic concept. chapter II is the image aesthetic in the graphic, and chapter III is the artist experience, Chapter III specializes in research procedures: community, sample, curriculum, tool, and sample analysis. Chapter IV ended with results, including: dynamic research sample illustrated of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2011
Journal Name
Journal Of Engineering
DAMAGE DETECTION AND LOCATION FOR IN AND OUT-OFPLANE CURVED BEAMS USING FUZZY LOGIC BASED ON FREQUENCY DIFFERENCE
...Show More Authors

In this study, structures damage identification method based on changes in the dynamic characteristics
(frequencies) of the structure are examined, stiffness as well as mass matrices of the curved
(in and out-of-plane vibration) beam elements is formulated using Hamilton's principle. Each node
of both of them possesses seven degrees of freedom including the warping degree of freedom. The
curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory
in 1994. A computer program was developing to carry out free vibration analyses of the curved
beam as well as straight beam. Comparing with the frequencies for other researchers using the general
purpose program MATLAB. Fuzzy logic syste

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Apr 12 2023
Journal Name
Iraqi Postgraduate Medical Journal
The Accuracy of Electrocardiographic Criteria for Predicting Left Ventricular Hypertrophy in adult Patients with Systemic Hypertension
...Show More Authors

ABSTRACT: BACKGROUND: Left ventricular hypertrophy is a significant risk factor for cardiovascular complications such as ischemic heart disease, heart failure, sudden death, atrial fibrillation, and stroke. A proper non-expensive tool is required for detection of this pathology. Different electrocardiographic (ECG) criteria were investigated; however, the results were conflicting regarding the accuracy of these criteria. OBJECTIVE: To assess the accuracy of three electrocardiographic criteria in diagnosis of left ventricular hypertrophy in adult patients with hypertension using echocardiography as a reference test. PATIENTS AND METHODS: This is a hospital-based cross sectional observational study which included 340 adult patients with a his

... Show More
Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of big data analytics in measuring and analyzing the quality costs of economic units : applied research in the Iraqi company for seed production
...Show More Authors

                The research aims to explain the role of huge data analyzes in measuring quality costs in the Iraqi company for the production of seed, and the research problem was diagnosed with the weakness of the approved method to measure quality costs, and the weak traditional systems of data analyzes, the researcher in the theoretical aspect relied on collecting sources and previous studies, as well as Adoption of the applied analytical approach in the practical aspect, as a set of financial analyzes were applied within the measurement of quality costs and a statement of the role of data analyzes in the practical side, the research concluded to a set of conc

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
The Factors Affecting on Managing Sensitive Data in Cloud Computing
...Show More Authors

Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jan 18 2017
Journal Name
International Journal Of Pharmacy Practice
Antimicrobial utilization in an Iraqi province: a comprehensive evaluation of antibiotic source and cost
...Show More Authors

View Publication
Scopus (9)
Crossref (6)
Scopus Crossref
Publication Date
Mon Jul 01 2013
Journal Name
Political Sciences Journal
Towards Promoting Political Participation of Female - University Students - Field Study on Al-Quds Open University Female - Students - Rafah
...Show More Authors

نحو تعزيز المشاركة السياسية للطالبات الجامعيات الفلسطينيات

View Publication Preview PDF
Crossref