Preferred Language
Articles
/
wReIa5IBVTCNdQwCWq9P
Comparing Open Source Map Data in Areas Lacking Authoritative Mapping
...Show More Authors

One wide-ranging category of open source data is that referring to geospatial information web sites. Despite the advantages of such open source data, including ease of access and cost free data, there is a potential issue of its quality. This article tests the horizontal positional accuracy and possible integration of four web-derived geospatial datasets: OpenStreetMap (OSM), Google Map, Google Earth and Wikimapia. The evaluation was achieved by combining the tested information with reference field survey data for fifty road intersections in Baghdad, Iraq. The results indicate that the free geospatial data can be used to enhance authoritative maps especially small scale maps.

Publication Date
Tue Jan 03 2023
Journal Name
College Of Islamic Sciences
Ruling on selling big data (Authentical Fiqh Study): Ruling on selling big data (Authentical Fiqh Study)
...Show More Authors

Abstract:

Research Topic: Ruling on the sale of big data

Its objectives: a statement of what it is, importance, source and governance.

The methodology of the curriculum is inductive, comparative and critical

One of the most important results: it is not permissible to attack it and it is a valuable money, and it is permissible to sell big data as long as it does not contain data to users who are not satisfied with selling it

 Recommendation: Follow-up of studies dealing with the provisions of the issue

Subject Terms

Judgment, Sale, Data, Mega, Sayings, Jurists

 

View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
Indian Journal Of Ecology
Effect of sedimentary source on the properties of sphericity and roundness of feldspar minerals in some soils of the alluvial plain
...Show More Authors

This study was conducted on the effect of the sedimentary source (the sediments coming from both the Iraqi-Iranian borderline and the Tigris river) on the optical and textural features, especially sphericity and roundness of feldspar minerals (potassium and plagioclase types) in soils of the southern part of the alluvial plain. Eight pedons were selected to represent the study area, five of them represented sediments coming from the borderline, which included pedons of (Badra, Taj Al-Din, Al-Shihabi, Jassan, and Galati), while two of them represent the sediments of the Tigris River (Essaouira, Al-Dabouni), the pedon of Ali Al-Gharbi was represented the mixing area of sediments of all the floods coming from the borderline and the sediments o

... Show More
Scopus (2)
Scopus
Publication Date
Sun Mar 04 2012
Journal Name
Baghdad Science Journal
Evaluation of cellular immune response in Golden Hamsters experimentally infected with Leishmania donovani comparing with cellular immune response against chicken Red Blood Cells.
...Show More Authors

The Evaluation of the immune response in Golden Hamsters experimentally infected with Leishmania donovani was determined in this study, particularly, the cellular immune response. Follow up has maintained to determine the Delayed Type of Hypersensitivity using skin test both in infected and control lab animals. Chicken red blood cells were used as a parameter to evaluate the immune system; they are dull and have the ability of immunization. Two concentrations of chicken R.B.C were examined to determine which gives the higher titration in Hamsters and those were 1.5 X 109 cell/ml and 3 X 109 cell/ml , the second concentration gave the maximum titration where then used in this work. After sensitization with Chicken R.B.C for both infected a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Agricultural Engineering
Comparing Nozzles with Different Wear Rate and Working with the Same Application Rate of Different Plant Protection Products in Aspect of Plants Condition
...Show More Authors
Abstract<p>Three different types of nozzles (different wear rate) were used in this study. They are classified depending on the severity of their wear to three groups: new, worn and damaged nozzles. Those nozzles were spraying with the same application rate (303 l/ha) on two-year field trials; this was achieved by changing the spraying pressure for each group of nozzles in order to get the same application rate. This practice is usually done by operators of sprayers, who calibrate the sprayers on the same application rate every year without changing the nozzles, so they tend to reduce the spraying pressure in order to compensate the flow rate increase due to the nozzles yearly wear. Two types of</p> ... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sun Mar 04 2012
Journal Name
Baghdad Science Journal
Evaluation of cellular immune response in Golden Hamsters experimentally infected with Leishmania donovani comparing with cellular immune response against chicken Red Blood Cells.
...Show More Authors

The Evaluation of the immune response in Golden Hamsters experimentally infected with Leishmania donovani was determined in this study, particularly, the cellular immune response. Follow up has maintained to determine the Delayed Type of Hypersensitivity using skin test both in infected and control lab animals. Chicken red blood cells were used as a parameter to evaluate the immune system; they are dull and have the ability of immunization. Two concentrations of chicken R.B.C were examined to determine which gives the higher titration in Hamsters and those were 1.5 X 109 cell/ml and 3 X 109 cell/ml , the second concentration gave the maximum titration where then used in this work. After sensitization with Chicken R.B.C for both in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Implementation of new Secure Mechanism for Data Deduplication in Hybrid Cloud
...Show More Authors

Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of

... Show More
View Publication Preview PDF
Publication Date
Sat Nov 02 2013
Journal Name
International Journal Of Computer Applications
Mixed Transforms Generated by Tensor Product and Applied in Data Processing
...Show More Authors

Finding orthogonal matrices in different sizes is very complex and important because it can be used in different applications like image processing and communications (eg CDMA and OFDM). In this paper we introduce a new method to find orthogonal matrices by using tensor products between two or more orthogonal matrices of real and imaginary numbers with applying it in images and communication signals processing. The output matrices will be orthogonal matrices too and the processing by our new method is very easy compared to other classical methods those use basic proofs. The results are normal and acceptable in communication signals and images but it needs more research works.

View Publication
Crossref
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
Optimal UAV Deployment for Data Collection in Deadline-based IoT Applications
...Show More Authors

The deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming m

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Fri Jun 01 2018
Journal Name
International Journal Of Computer Science Trends And Technology
Secure Video Data Deduplication in the Cloud Storage Using Compressive Sensing
...Show More Authors

Cloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Bulletin Of Electrical Engineering And Informatics
Proposed model for data protection in information systems of government institutions
...Show More Authors

Information systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref