Preferred Language
Articles
/
qhc1WZABVTCNdQwCkYea
Revealing the potentials of 3D modelling techniques; a comparison study towards data fusion from hybrid sensors
...Show More Authors
Abstract<p>The vast advantages of 3D modelling industry have urged competitors to improve capturing techniques and processing pipelines towards minimizing labour requirements, saving time and reducing project risk. When it comes to digital 3D documentary and conserving projects, laser scanning and photogrammetry are compared to choose between the two. Since both techniques have pros and cons, this paper approaches the potential issues of individual techniques in terms of time, budget, accuracy, density, methodology and ease to use. Terrestrial laser scanner and close-range photogrammetry are tested to document a unique invaluable artefact (Lady of Hatra) located in Iraq for future data fusion scenario. Insight investigations of the factors affecting data processing and modelling in individual comparing techniques are discussed and analysed. Qualitative and quantitative statistical analysis was applied based on multiple criteria, such as level of automation (LOA), accuracy and point cloud integrity towards the adaption of data fusion approaches and co-registering frameworks for optimal deliverables.</p>
Scopus Clarivate Crossref
View Publication
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Mathematical Modelling of Gene Regulatory Networks
...Show More Authors

    This research includes the use of an artificial intelligence algorithm, which is one of the algorithms of biological systems which is the algorithm of genetic regulatory networks (GRNs), which is a dynamic system for a group of variables representing space within time. To construct this biological system, we use (ODEs) and to analyze the stationarity of the model we use Euler's method. And through the factors that affect the process of gene expression in terms of inhibition and activation of the transcription process on DNA, we will use TF transcription factors. The current research aims to use the latest methods of the artificial intelligence algorithm. To apply Gene Regulation Networks (GRNs), we used a progr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 20 2025
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using a 3D Chaotic Dynamic System as a Random Key Generator for Image Steganography
...Show More Authors

In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the

... Show More
View Publication Preview PDF
Publication Date
Tue May 20 2008
Journal Name
Journal Of Planner And Development
Estimating Water Quality from Satellite Image and Reflectance Data
...Show More Authors

The useful of remote sensing techniques in Environmental Engineering and another science is to save time, Coast and efforts, also to collect more accurate information under monitoring mechanism. In this research a number of statistical models were used for determining the best relationships between each water quality parameter and the mean reflectance values generated for different channels of radiometer operate simulated to the thematic Mappar satellite image. Among these models are the regression models which enable us to as certain and utilize a relation between a variable of interest. Called a dependent variable; and one or more independent variables

View Publication Preview PDF
Publication Date
Sun Jan 04 2015
Journal Name
Journal Of Educational And Psychological Researches
The Relationship between Social Anxiety and Mindfulness In Iraqi Women Living In Iraq And The UK; A Comparison Study
...Show More Authors

The continuous pressure of work and daily life and the increasing financial and social stress that Iraqi women are experiencing (both inside and outside Iraq) is one of the main causes of anxiety, particularly in those of working class women. This group of women carry the burden of carrying out multiple roles and responsibilities at the same time. All this collectively make them more prone to developing anxiety compared to men. In addition, the physiological and psychological nature of women, as females, on top of the other roles in life, like being a wife or mother or daughter or sister, all add extra pressure on women especially for those who are considered as productive working individuals in the society. In order to study the relatio

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Fusion Splicing for a Large Mode Area Photonic Crystal Fiber with Conventional Single Mode Fiber
...Show More Authors

In this paper the experimentally obtained conditions for the fusion splicing with photonic crystal fibers (PCF) having large mode areas were reported. The physical mechanism of the splice loss and the microhole collapse property of photonic crystal fiber (PCF) were studied. By controlling the arc-power and the arc-time of a conventional electric arc fusion splicer (FSM-60S), the minimum loss of splicing for fusion two conventional single mode fibers (SMF-28) was (0.00dB), which has similar mode field diameter. For splicing PCF (LMA-10) with a conventional single mode fiber (SMF-28), the loss was increased due to the mode field mismatch.

View Publication Preview PDF
Publication Date
Fri Aug 28 2020
Journal Name
Iraqi Journal Of Science
A comparison of the Effects of Lemon Peel -Silver Nanoparticles Versus Brand Toothpastes and Mouthwashes on Staphylococcus Spp. Isolated From Teeth Caries
...Show More Authors

Thirty one  samples of gum swabs were collected from patients with tooth caries (5-30 years old)  from the College of Science (Biology department )- University of Baghdad- Iraq for the period from October 2018 to December 2018. , The samples were transported, after inoculation in a transport media (nutrient broth), to the laboratory of the College of Science and then cultured on mannitol salt agar and  blood agar). The isolates belonging to Staphylococcus spp. were identified by biochemical tests and Vitek 2 compact system, while the more antibiotic resistant isolates were identified by using Polymerase Chain Reaction(ï´¾PCR)  and sequencing of 16SrRNA . The results showed sharp UV absorption peaks at 330 - 340nm and AFM at 5

... Show More
Preview PDF
Scopus (20)
Crossref (12)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
A comparison between banana peel powder and gel for removing methylene blue dye from aqueous solution
...Show More Authors

This research aims to removes dyes from waste water by adsorption using banana peels. The conduct experiment done by banana powder and banana gel to compare between them and find out which one is the most efficient in adsorption. Studying the effects different factors on adsorption material and calculate the best removal efficiency to get rid of the methylene blue dye (MB).

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Mar 01 2025
Journal Name
Basic Education College Magazine For Educational And Humanities Sciences
The Transformation of Power: A Study of Coriolanus from Soldier to Statesman
...Show More Authors

William Shakespeare's play Coriolanus explores the journey of power and the transformation of a skilled warrior into a statesman. This paper employs Machiavelli’s framework of pragmatic statecraft to analyse Coriolanus’s tragic failure as a political leader despite his unparalleled prowess as a Roman general. It analyses Coriolanus's political career, revealing how his military skills, while effective in warfare, do not translate into political success. The paper shows that Coriolanus’s contempt for performative politics, refusal to adopt civic diplomacy, and failure to soften aristocratic pride with populist appeal turn plebeians against him and alienate patricians. His upholding of martial honour — fostered by his mother Volumnia

... Show More
View Publication
Publication Date
Sun Oct 31 2021
Journal Name
International Journal Of Sustainable Development And Planning
The Crossing as a New Approach for the Urban Transformation of Traditional Cities Towards the Sustainability
...Show More Authors

The topic of urban transformations has attracted the attention of researchers as it is one of the basic issues through which cities can be transformed towards sustainability. A specific level of transformation levels according to a philosophical concept known as a crossing. This article has relied on a specific methodology that aims to find a new approach for urban transformation based on the crossing concept. This concept derives from philosophical entrances based on the concepts of (being, process, becoming, and integration). Four levels have been for the crossing are (normal, ascending, leap, and descending). Each of these levels includes specific characteristics that distinguish it. The results showed that there is no descending

... Show More
View Publication
Scopus (17)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref