Preferred Language
Articles
/
qhc1WZABVTCNdQwCkYea
Revealing the potentials of 3D modelling techniques; a comparison study towards data fusion from hybrid sensors
...Show More Authors
Abstract<p>The vast advantages of 3D modelling industry have urged competitors to improve capturing techniques and processing pipelines towards minimizing labour requirements, saving time and reducing project risk. When it comes to digital 3D documentary and conserving projects, laser scanning and photogrammetry are compared to choose between the two. Since both techniques have pros and cons, this paper approaches the potential issues of individual techniques in terms of time, budget, accuracy, density, methodology and ease to use. Terrestrial laser scanner and close-range photogrammetry are tested to document a unique invaluable artefact (Lady of Hatra) located in Iraq for future data fusion scenario. Insight investigations of the factors affecting data processing and modelling in individual comparing techniques are discussed and analysed. Qualitative and quantitative statistical analysis was applied based on multiple criteria, such as level of automation (LOA), accuracy and point cloud integrity towards the adaption of data fusion approaches and co-registering frameworks for optimal deliverables.</p>
Scopus Clarivate Crossref
View Publication
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Medicinal And Chemical Sciences
Synthesis and Identification of New 2-Substituted-1,3,4-Oxadiazole Compounds from Creatinine and Study Their Antioxidant Activities
...Show More Authors

Scopus (6)
Scopus
Publication Date
Thu Sep 05 2019
Journal Name
Journal Of Global Pharma Technology
Synthesis, Characterization and Antibacterial Study of New 4-Thiazolidinone and Tetrazole Compounds Derived from Thiosemicarbazone and Hydrazones
...Show More Authors

A new 4-thiazolidinone, substitutedbenzylidene-thiazolidinone and tetrazole were synthesized from thiosemicarbazone and hydrazone. The thiosemicarbazone was prepared by the reaction of thiosemicarbazide with aldehyde derivative from L-ascorbic acid in absolute ethanol using glacial acetic acid as a catalyst. 1, 3-thiazolidin-4-ones were synthesized from the condensation of thiosemicarbazones with chloroacetic acid in presence of anhydrous sodium acetate. A 1, 3- thiazolidine-4-one was reaction with several 4-substitutedaldehydes to produce new derivatives with a double bond at the position-5 of the 4-thiazolidinone ring. While the tetrazole compounds were synthesized by 1, 3-cycloaddition reaction of sodium azide and hydrazone compounds in

... Show More
Preview PDF
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Adsorption and Thermodynamic Study of Direct Blue 71 Dye on to natural Flint Clay from Aqueous Solution
...Show More Authors

The remove of direct blue (DB71) anionic dye on flint clay in aqueous solution was investigated by using a batch system for various dye concentrations. The contact time, pH, adsorbent dose, and temperature was studied under batch adsorption technique. The data of adsorption equilibrium fit with isotherm Langmuar and Freiundlich ,when the correlation coefficient used to elucidate the best fitting isotherm model. The thermodynamic parameters such as, ?Hº ,?Sº and ?Gº. Thermodynamic analysis indicated that the sorption of the dyes onto Flint clay was endothermic and spontaneous.

View Publication Preview PDF
Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Journal Of The College Of Education For Women
A Cognitive Linguistic Study of Visual Language as a Reflection of Culture: Violence Against Women in Iraq
...Show More Authors

The present work is qualitative descriptive. It aims to examine the idiosyncratic schema when deciphering the selected violence-based panel from Nasser Ibrahim’s caricatures. The researchers accordingly adopted part of Sharifian’s (2011) Cultural Schema model, particularly that part that is concerned with the examining the micro/idiosyncratic level of understanding. The study has revealed that the participants have not only differed among themselves regarding the way a figure is being denotatively conceptualized, they also highlighted different exact conceptualizations for the same figure, such as: using various adjectives that reflect various levels of intensity, emphasizing the behavioral aspect or the appearance of the figure, ado

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 05 2026
Journal Name
Al–bahith Al–a'alami
Foreign Series in the Kurdish Satellite Channels and Their Role in the Development of Awareness among Young People in the Kurdistan Region (Korean Series as a Model) (A Field Study on a Sample of Students of the Institute of Fine Arts in the City of Sulay
...Show More Authors

The dubbing process for the Foreign Dramas by the Kurdish language became a serious phenomenon in the Kurdish satellite TV, especially in the past few years. It attracted a wide audience, especially young adolescents. And prepared by some breakthrough hostile to Kurdish culture and value coordinated by others remedy for the structural gaps and lapses have, as a result of climate which is brought into existence globalization and secretions variety dimensional, saturated value and cognitive effects bearing a strong identity of its elements. From here, the problem of this research is the ambiguity of their role in a series of developmental processes Kurdish awareness of young people and the extent of the impact that caused it.

This

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Journal Of Engineering
Multi-Sites Multi-Variables Forecasting Model for Hydrological Data using Genetic Algorithm Modeling
...Show More Authors

A two time step stochastic multi-variables multi-sites hydrological data forecasting model was developed and verified using a case study. The philosophy of this model is to use the cross-variables correlations, cross-sites correlations and the two steps time lag correlations simultaneously, for estimating the parameters of the model which then are modified using the mutation process of the genetic algorithm optimization model. The objective function that to be minimized is the Akiake test value. The case study is of four variables and three sites. The variables are the monthly air temperature, humidity, precipitation, and evaporation; the sites are Sulaimania, Chwarta, and Penjwin, which are located north Iraq. The model performance was

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Semi parametric Estimators for Quantile Model via LASSO and SCAD with Missing Data
...Show More Authors

In this study, we made a comparison between LASSO & SCAD methods, which are two special methods for dealing with models in partial quantile regression. (Nadaraya & Watson Kernel) was used to estimate the non-parametric part ;in addition, the rule of thumb method was used to estimate the smoothing bandwidth (h). Penalty methods proved to be efficient in estimating the regression coefficients, but the SCAD method according to the mean squared error criterion (MSE) was the best after estimating the missing data using the mean imputation method

View Publication Preview PDF
Crossref
Publication Date
Mon Apr 11 2011
Journal Name
Icgst
Employing Neural Network and Naive Bayesian Classifier in Mining Data for Car Evaluation
...Show More Authors

In data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.