Preferred Language
Articles
/
sRdra5IBVTCNdQwCh69m
Matching assessment of road network objects of volunteered geographic information
...Show More Authors

Recently new concepts such as free data or Volunteered Geographic Information (VGI) emerged on Web 2.0 technologies. OpenStreetMap (OSM) is one of the most representative projects of this trend. Geospatial data from different source often has variable accuracy levels due to different data collection methods; therefore the most concerning problem with (OSM) is its unknown quality. This study aims to develop a specific tool which can analyze and assess the possibility matching of OSM road features with reference dataset using Matlab programming language. This tool applied on two different study areas in Iraq (Baghdad and Karbala), in order to verify if the OSM data has the same quality in both study areas. This program, in general, consists of three parts to assess OSM data accuracy: input data, measured and analysis, output results. The output of Matlab program has been represented as graphs. These graphs showed the number of roads during different periods such as each half meter or one meter for length and every half degree for directions, and so on .The results of the compared datasets for two case studies give the large number of roads during the first period. This indicates that the differences between compared datasets were small. The results showed that the case study of Baghdad was more accurate than the case study of holy Karbala.

Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Short Text Semantic Similarity Measurement Approach Based on Semantic Network
...Show More Authors

Estimating the semantic similarity between short texts plays an increasingly prominent role in many fields related to text mining and natural language processing applications, especially with the large increase in the volume of textual data that is produced daily. Traditional approaches for calculating the degree of similarity between two texts, based on the words they share, do not perform well with short texts because two similar texts may be written in different terms by employing synonyms. As a result, short texts should be semantically compared. In this paper, a semantic similarity measurement method between texts is presented which combines knowledge-based and corpus-based semantic information to build a semantic network that repre

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Mon Jan 02 2012
Journal Name
Journal Of Engineering
3-D Object Recognition using Multi-Wavelet and Neural Network
...Show More Authors

This search has introduced the techniques of multi-wavelet transform and neural network for recognition 3-D object from 2-D image using patches. The proposed techniques were tested on database of different patches features and the high energy subband of discrete multi-wavelet transform DMWT (gp) of the patches. The test set has two groups, group (1) which contains images, their (gp) patches and patches features of the same images as a part of that in the data set beside other images, (gp) patches and features, and group (2) which contains the (gp) patches and patches features the same as a part of that in the database but after modification such as rotation, scaling and translation. Recognition by back propagation (BP) neural network as com

... Show More
View Publication
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
WSN-WCCS: A Wireless Sensor Network Wavelet Curve Ciphering System
...Show More Authors

With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS).  The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN.  It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
The Role Of Information Technology In Enhancing Performance Evaluation And Responsibility Accounting (Empirical Study In Jordan Hotels )
...Show More Authors

   This paper suggesting a new modern method to evaluate the performance of hotel industry at Jordan instead of the classical method used by the industry and that is Bench Marking , this method can be done by comparing the performance of hotel industry at two serial years which helps in calculating a standard performance .

  The industry can use this standard to identify the variance, which make the evaluation of performance easier and support the efforts to develop the hotel industry at all levels and enable to give high quality services to customers.

    The study believed that this situation would not be achieved unless the hotel industry will app

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Improving the Performance of Construction Project Information and Communication Management Using Web-Based Project Management Systems (WPMSs)
...Show More Authors

This paper presents a brief study undertaken for improving the performance of information and communication management of construction projects through investing in information and communication technologies (ICT). The work aims at first to investigate and diagnose the problems, challenges, weaknesses, and inefficiencies related to information and communication management in projects in the construction industry of Iraq. Studying the diagnosed matters and the different solutions of ICT to improve project management performance is following the investigation process. The research presents a technological system suggested to process a lot of the diagnosed problems, challenges, weakness, and inefficiencies of the construction projects and t

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The impact of systems and information technology on stock market activity: Case study in Iraq stock market
...Show More Authors

Financial markets play an important role in the economy, as it contributes to the financial and economic system of the state stability, as it reduces the adoption of the companies on the loans granted by the banks, as financial markets contribute to attracting and channeling savings to small savers who will be able to buy a number of shares proportional to their savings, It also provides them the place of exchange, and play technology and information systems an important role in facilitating exchanges and increased market activity, in this research touched on the importance of information technology in effect on the activity of the financial markets. Research is divided into three demands of the first concept of eating and the importance

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 24 2023
Journal Name
Migration Letters
The Effect of Electronic Educational Games on the Information Generation Skills of the First Intermediate Grade Students in Mathematics
...Show More Authors

Scopus
Publication Date
Thu Nov 08 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Risk-health Related Behaviors of Female Adolescents and Their Determinants
...Show More Authors

Objectives: The study aims to assess the female adolescents’ risk-health behaviors, to identify their
determinants, to determine the association between the risk health behaviors and the stage of
adolescence for these females' demographic variable.
Methodology: A purposive sample of (268) female adolescents is selected from intermediate and
secondary schools in Baghdad City. These adolescents have presented the age of (14-19) year old and
divided into two groups of (14-16) year and (17-19) year. A questionnaire is constructed for the purpose
of the study, it is composed of (10) major parts, and the overall items, which are included in the
questionnaire, are (106) item. Reliability and validity of the questionnaire

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
World Journal Of Dentistry
Assessment of Implant Stability Changes and Success Rate of Narrow Dental Implants
...Show More Authors

Aims: To assess the success rate and implant stability changes of narrow dental implants (NDIs) during the osseous healing period. Materials and methods: This prospective observational clinical study included 21 patients with narrow alveolar ridge of restricted mesiodistal interdental span who received NDIs. The alveolar ridge width was determined by the ridge mapping technique. Implant stability was measured using Periotest® M immediately after implant insertion then after 4 weeks, 8 weeks and 12 weeks postoperatively. The outcome variables were success rate and implant stability changes during the healing period. The statistical analysis included one-way analysis of variance (ANOVA) and Tukey\'s multiple comparisons test, values < 0.05 w

... Show More
View Publication
Scopus Crossref