OpenStreetMap (OSM) represents the most common example of online volunteered mapping applications. Most of these platforms are open source spatial data collected by non-experts volunteers using different data collection methods. OSM project aims to provide a free digital map for all the world. The heterogeneity in data collection methods made OSM project databases accuracy is unreliable and must be dealt with caution for any engineering application. This study aims to assess the horizontal positional accuracy of three spatial data sources are OSM road network database, high-resolution Satellite Image (SI), and high-resolution Aerial Photo (AP) of Baghdad city with respect to an analogue formal road network dataset obtained from the Mayoralty of Baghdad (MB). The methodology of, U.S. National Standard Spatial Data Accuracy (NSSDA) was applied to measure the degree of agreement between each data source and the formal dataset (MB) in terms of horizontal positional accuracy by computing RMSE and NSSDA values. The study concluded that each of the three data sources does not agree with the MB dataset in both study sites AL-Aadhamiyah and AL-Kadhumiyah in terms of positional accuracy.
This study has been accomplished by testing three different models to determine rocks type, pore throat radius, and flow units for Mishrif Formation in West Qurna oilfield in Southern Iraq based on Mishrif full diameter cores from 20 wells. The three models that were used in this study were Lucia rocks type classification, Winland plot was utilized to determine the pore throat radius depending on the mercury injection test (r35), and (FZI) concepts to identify flow units which enabled us to recognize the differences between Mishrif units in these three categories. The study of pore characteristics is very significant in reservoir evaluation. It controls the storage mechanism and reservoir fluid prope
This study aimed to analyze functional thinking style and its contribution to learn the accuracy of block and smash serve in volleyball among university students. The sample was composed of 120 students of the College of Physical Education and Sports Sciences of the University of Baghdad (academic year 2021/2022). The statistical analyses were carried out with the statistical software SPSS and correlation analyses were conducted. It was found that functional thinking style significantly contributed to learn the accuracy of block and smash serve in volleyball among university students. Therefore, it is necessary to intensify efforts to increase the level of functional thinking among university students, by adopting acad
... Show MoreApical periodontitis (AP) is the most prevalent chronic inflammatory disease of the teeth. Bone resorption dynamics in symptomatic and asymptomatic AP are still unrecognized. This study examined different inflammatory markers within gingival crevicular fluid, including matrix metalloproteinases 8 (MMP8), tissue inhibitors of metalloproteinases 1 (TIMP1), receptor activator of nuclear factor κB (RANK), its ligand (RANKL), and osteoprotegerin (OPG), to be used in comparing symptomatic apical periodontitis (SAP) and asymptomatic apical periodontitis (AAP) versus healthy teeth. Subjects with SAP, AAP, and a control group were recruited and GCF samples were collected by Periopaper strips. Clinical and radiographical measures were used f
... Show MoreSevere periodontitis is ranked as the sixth most prevalent disease affecting humankind, with an estimated 740 million people affected worldwide. The diagnosis of periodontal diseases mainly relies upon assessment of conventional clinical parameters. However, these parameters reflect past, rather than current, clinical status or future disease progression and, likely, outcome of periodontal treatment. Specific and sensitive biomarkers for periodontal diseases have been examined widely to address these issues and some biomarkers have been translated as point-of-care (PoC) tests. The aim of this review was to provide an update on PoC tests for use in the diagnosis and management of periodontal diseases. Among the PoC tests developed so
... Show MoreInformation hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key
... Show MoreIn this study, the mobile phone traces concern an ephemeral event which represents important densities of people. This research aims to study city pulse and human mobility evolution that would be arise during specific event (Armada festival), by modelling and simulating human mobility of the observed region, depending on CDRs (Call Detail Records) data. The most pivot questions of this research are: Why human mobility studied? What are the human life patterns in the observed region inside Rouen city during Armada festival? How life patterns and individuals' mobility could be extracted for this region from mobile DB (CDRs)? The radius of gyration parameter has been applied to elaborate human life patterns with regards to (work, off) days for
... Show MoreData compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show More