Preferred Language
Articles
/
joe-975
Evaluation of the Accuracy of Digital Elevation Model Produced from Different Open Source Data
...Show More Authors

This study aims to estimate the accuracy of digital elevation models (DEM) which are created with exploitation of open source Google Earth data and comparing with the widely available DEM datasets, Shuttle Radar Topography Mission (SRTM), version 3, and Advanced Spaceborne Thermal Emission and Reflection Radiometer Global Digital Elevation Model (ASTER GDEM), version 2. The GPS technique is used in this study to produce digital elevation raster with a high level of accuracy, as reference raster, compared to the DEM datasets. Baghdad University, Al Jadriya campus, is selected as a study area. Besides, 151 reference points were created within the study area to evaluate the results based on the values of RMS.Furthermore, the Geographic Information System (GIS) was utilized to analyze, imagine and interpolate data in this study. The result of the statistical analysis revealed that RMSE of DEM related to the differences between the reference points and Google Earth, SRTM DEM and ASTER GDEM are 6.9, 5.5 and 4.8, respectively. What is more, a finding of this study shows convergence the level of accuracy for all open sources used in this study.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
The metaphoric problem of topography In the scenario of war films Model the film (fury)
...Show More Authors

The study of topography most important studies and depth of any literary or artistic text and occupy the thinking of many who work in art at generally. There is hardly any film scenario from description in general of the indispensable elements of the composition and place one. So the place starts form since the scriptwriter begins to view the result of the description begins to feature the emergence of there are simple operations in the scenario soon to receive growth as a final achievement in the film. The description of the place begins to take on an allegorical character as a language version in the script, soon translated into another language, the language of the picture. Which in turn complement the creative ring of cinematic art a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 01 2025
Journal Name
مجلة كلية التربية الاساسية
The Effect of the inquiry wheel model on the chemical enlightenment of Second- Year intermediate School female Students
...Show More Authors

The aim of the research was to know the effect of the inquiry wheel model on chemical enlightenment among second-grade middle school female students in government daytime middle and secondary schools. Umm AlQura Middle School was chosen by intentional selection to be its students as the research sample for the academic year (2024-2025). Two groups were chosen, one of which was the experimental group studying using the inquiry wheel model and the other the control group studying in the usual way. The equivalence of the two research groups was verified by a set of variables, which were (chronological age in months, previous information test, Raven's intelligence test, chemical enlightenment scale). As for the research tool, the researchers bu

... Show More
Preview PDF
Publication Date
Wed Apr 30 2025
Journal Name
Iraqi Journal Of Science
Calculating the Variation of the Universal Parameter (Variable) Using Kepler's Equation for Different Orbits
...Show More Authors

Stumpff functions are an infinite series that depends on the value of z. This value results from multiplying the reciprocal semi-major axis with a universal anomaly. The purpose from those functions is to calculate the variation of the universal parameter (variable) using Kepler's equation for different orbits. In this paper, each range for the reciprocal of the semi-major axis, universal anomaly, and z is calculated in order to study the behavior of Stumpff functions C(z) and S(z). The results showed that when z grew, Stumpff functions for hyperbola, parabola, and elliptical orbits were also growing. They intersected and had a tendency towards zero for both hyperbola and parabola orbits, but for elliptical orbits, Stumpff functions

... Show More
Preview PDF
Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Economics And Administrative Sciences
Comparing Different Estimators for the shape Parameter and the Reliability function of Kumaraswamy Distribution
...Show More Authors

In this paper, we used maximum likelihood method and the Bayesian method to estimate the shape parameter (θ), and reliability function (R(t)) of the Kumaraswamy distribution with two parameters l , θ (under assuming the exponential distribution, Chi-squared distribution and Erlang-2 type distribution as prior distributions), in addition to that we used method of moments for estimating the parameters of the prior distributions. Bayes

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Bayesian Estimator for the Scale Parameter of the Normal Distribution Under Different Prior Distributions
...Show More Authors

In this study, we used Bayesian method to estimate scale parameter for the normal distribution. By considering three different prior distributions such as the square root inverted gamma (SRIG) distribution and the non-informative prior distribution and the natural conjugate family of priors. The Bayesian estimation based on squared error loss function, and compared it with the classical estimation methods to estimate the scale parameter for the normal distribution, such as the maximum likelihood estimation and th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
The Position of the United States from Britain in the discussions of British Evacuation from Egypt (1946-1952)
...Show More Authors

Many reasons combined behind the Standing of U.S. against Britain in its aggression against Egypt in 1956; the consensus of world opinion on the need to stop the aggression and the fear of the Soviet military intervention which mean a new world war.
United States desired to weaken British influences in the region in general to get new oil gains in the Arabian Gulf and Egypt at the expense of Britain. The exiting of Britain from the area served U.S. strategic interests in the Middle East in general and Egypt in particular to keep the flow of oil for U.S advantage.
The United States wanted to keep its image in the region to apply its future political projects including Eisenhower Project, which intended to take the position of Britis

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Engineering
Evaluation The Performance Geodetic of the Receivers Using Static Positioning Technique
...Show More Authors

Global Navigation Satellite System (GNSS) is considered to be one of the most crucial tools for different applications, i.e. transportation, geographic information systems, mobile satellite communications, and others. Without a doubt, the GNSS has been widely employed for different scientific applications, such as land surveying, mapping, and precise monitoring for huge structures, etc. Thus, an intense competitive has appeared between companies which produce geodetic GNSS hardware devices to meet all the requirements of GNSS communities. This study aims to assess the performance of different GNSS receivers to provide reliable positions. In this study, three different receivers, which are produced by different manufactur

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Engineering
Evaluation The Performance Geodetic of the Receivers Using Static Positioning Technique
...Show More Authors

Global Navigation Satellite System (GNSS) is considered to be one of the most crucial tools for different applications, i.e. transportation, geographic information systems, mobile satellite communications, and others. Without a doubt, the GNSS has been widely employed for different scientific applications, such as land surveying, mapping, and precise monitoring for huge structures, etc. Thus, an intense competitive has appeared between companies which produce geodetic GNSS hardware devices to meet all the requirements of GNSS communities. This study aims to assess the performance of different GNSS receivers to provide reliable positions. In this study, three different receivers, which are produced by different manufacturers, were fi

... Show More
View Publication
Crossref
Publication Date
Wed Dec 11 2019
Journal Name
Journal Of The College Of Education For Women
The Impact of the Selective Model on the Acquisition of Kurdish Grammar Concepts among Female Students in the Eighth Grade
...Show More Authors

This research aims to identify the impact of the selective model in acquiring the concepts of Kurdish grammar among female students in the eighth grade, and to achieve the goal of research, the researcher selected the experimental design with partial control  and dimensional testing; the sample includes basic schools in the Chim district of Chamal/ Sulaymaniyah and randomly selected the basic school (Maha Bad) to be the field of application of the experiment and the random drawing method was chosen: two out of three sections and the number of students of the two sections is (75) students; section (C) represents the experimental group that studied the rules according to the selective model and its number is (37) students, while secti

... Show More
View Publication Preview PDF