The vast advantages of 3D modelling industry have urged competitors to improve capturing techniques and processing pipelines towards minimizing labour requirements, saving time and reducing project risk. When it comes to digital 3D documentary and conserving projects, laser scanning and photogrammetry are compared to choose between the two. Since both techniques have pros and cons, this paper approaches the potential issues of individual techniques in terms of time, budget, accuracy, density, methodology and ease to use. Terrestrial laser scanner and close-range photogrammetry are tested to document a unique invaluable artefact (Lady of Hatra) located in Iraq for future data fusion scenario. Insight investigations of the factors affecting data processing and modelling in individual comparing techniques are discussed and analysed. Qualitative and quantitative statistical analysis was applied based on multiple criteria, such as level of automation (LOA), accuracy and point cloud integrity towards the adaption of data fusion approaches and co-registering frameworks for optimal deliverables.
A new distribution, the Epsilon Skew Gamma (ESΓ ) distribution, which was first introduced by Abdulah [1], is used on a near Gamma data. We first redefine the ESΓ distribution, its properties, and characteristics, and then we estimate its parameters using the maximum likelihood and moment estimators. We finally use these estimators to fit the data with the ESΓ distribution
The study relied on data about the health sector in Iraq in 2006 in cooperation with the Ministry of Health and the Central Bureau of Statistics and Information Technology in 2007 Included the estimates of the population distribution of the Baghdad province and the country depending on the population distribution for 1997,evaluate the health sector which included health institutions, and health staff, and other health services. The research Aimis; Measurement an amount and size of the growth of health services (increase and decrease) and the compare of verified in Iraq and Baghdad, and evaluate the effectiveness of the distribution of supplies and health services (physical and human) of the size of the population distribution and
... Show MorePriority of road maintenance can be viewed as a process influenced by decision-makers with varying decision-making power. Each decision-maker may have their view and judgment depending on their function and responsibilities. Therefore, determining the priority of road maintenance can be thought of as a process of MCDM. Regarding the priority of road maintenance, this is a difficult MCDM problem involving uncertainty, qualitative criteria, and possible causal relationships between choice criteria. This paper aims to examine the applicability of multiple MCDM techniques, which are used for assessing the priority of road maintenance, by adapting them to this sector. Priority of road maintenance problems subject to internal
... Show MoreThe design was distinguished in Late Twenty-First Century With new and new methods Through which the ability to adapt all technical media in the formation of two-dimensional and three-dimensional figures and shapes was achieved .
Which led to the emergence of endless sets of design ideas characterized by the heterogeneity of design forms and design solutions that preceded it. The designer could not access these creations in various architectural and artistic fields only through computer programs, especially those related to the activation of mathematical logic and what is known as algorithms in the formation and construction of the form, which led to the emergence of the "parametric direction" and the problem of research is summarized
Precise forecasting of pore pressures is crucial for efficiently planning and drilling oil and gas wells. It reduces expenses and saves time while preventing drilling complications. Since direct measurement of pore pressure in wellbores is costly and time-intensive, the ability to estimate it using empirical or machine learning models is beneficial. The present study aims to predict pore pressure using artificial neural network. The building and testing of artificial neural network are based on the data from five oil fields and several formations. The artificial neural network model is built using a measured dataset consisting of 77 data points of Pore pressure obtained from the modular formation dynamics tester. The input variables
... Show MoreThis study aims to know how and what is the media processing presented by the television talk shows for the religious extremism topics in terms of topics, hosted personalities, and ways to address this global phenomenon.
The study is based on descriptive research, and the researcher used the analytical-survey method, analyzing the episodes of (Awkar Al Dhalam) T.V Show which was presented on Al-Iraqiya News Channel, and (Islam Hur) T.V Show which was presented on Al-Hurra in 2019 with 25 episodes from each Show, The sample and research community was chosen with the intent to cover the research problem and its
The study reached several conclusions, including:
- The various dialogs in the episo
Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreA study of the hadiths of supplication orchestration