Motives: Baghdad is the capital city and an important political, administrative, social, cultural and economic centre of Iraq. Baghdad’s growth and development has been significantly influenced by efforts to accommodate various needs of its steadily growing population. Uncontrolled population and urban growth have exerted negative effects in numerous dimensions, including environmental sustainability because urban expansion occurred in green spaces within the city and the surrounding areas.Aim: The aim of this study was to examine the planning solutions in Baghdad’s green areas in the past and at present, and to identify the key changes in the city’s green areas, including changes in the ratio of green urban spaces to the total area of the city. Comprehensive urban development plans for Baghdad were analysed; the main solutions addressing urban green spaces were discussed; the advantages and disadvantages of previous and present urban development plans were examined, and the percentage of green urban spaces in Baghdad was investigated based on drafts of the city’s comprehensive development plans.Results: Baghdad’s Masterplan pays considerable attention to the development and preservation of urban green spaces which exert profound effects on the climate, the local environment, the city’s aesthetic and recreational value, and its social and economic development. The previous and present masterplans share numerous priorities with the aim of improving the city’s environmental and ecological health.
In this paper, we study the incorporation of the commensalism interaction and harvesting on the Lotka–Volterra food chain model. The system provides one commensal prey, one harvested prey, and two predators. A set of preliminary results in local bifurcation analysis around each equilibrium point for the proposed model is discussed, such as saddle-node, transcritical and pitchfork. Some numerical analysis to confirm the accruing of local bifurcation is illustrated. To back up the conclusions of the mathematical study, a numerical simulation of the model is carried out with the help of the MATLAB program. It can be concluded that the system's coexistence can be achieved as long as the harvesting rate on the second prey population is
... Show MoreThis research is devoted to investigate the behavior and performance of reinforced concrete beams strengthened with externally bonded Carbon Fiber Reinforced Polymer (CFRP) laminates under the effect of torsion. In this study a theoretical analysis has been conducted using finite element code ANSYS. Six previously tested beams are used to investigate reinforced concrete beams behavior
under torsion, two of them are solid and the rest are box-section beams. Also, two beams are without CFRP reinforcement, which are used as control beams for the strengthened one, and the other four beams are strengthened with CFRP laminates with different number of layers and spacing. Numerical investigation is conducted on these beams, and comparisons b
Abstract:
Typological analysis about the negation marker in different languages is one of the fields of research that has attracted much attention. In Persian language, this constituent has been analysed from different aspects. This study aimed to analyse different aspects of negation marker in the adjectives, the noun phrases and the verb phrases based on typological analysis. Many studies have been revealed that the negation in adjectives has shown lexically and morphologically. In the noun phrases, /hich/ has used as a negative marker necessarily marking the verb phrase as negative too. In the verb phrases, negation occurs morphologically by the addition of the prefix /n
... Show MoreThe current article focuses on studying the social organization reality of the Iraqi society; it aims to construct an Iraqi organized personality that believe in the principles of Islamic religion by making use of the sociology thoughts in explaining the strength of social organization, and the causes of social deviance in attempt of decreasing the deviance and strengthening the cohesion of Iraqi character.
The researchers put forward some questions: to what extent the western theoretical pattern can succeed in explaining the social organization of the Iraqi society? What is the more appropriate western theory for diagnosing the cohesion and deviance of the society? What is the s
... Show MoreThe purpose of this paper is to recognize the impact of database levels on fields of banking service (provision of remittance services and transfer of funds, save financial deposits, provision of personal loans services) in some of Iraqi banks using one-way multivariate analysis of variance. The paper population consisted of (120) employees, then a random stratified sample of (104) employees was taken. A questionnaire paper consists of (24) items were designed in order to analyze by one-Way multivariate analysis of variance (MANOVA) using SPSS.One of the main findings of the current paper is that there is an impact of database on fields of banking service in Iraqi banks (Al Rafidain and Al Rasheed).
The exchange rate is the backbone of any economy in the world, whether developed or developing, where most countries adopted many policies, in order to ensure the stability of the exchange rate of the currency, because of its importance as a link between the local economy and the others ,And it contribute in the achievement of internal and external balance and despite the many different factors that affect it, but there is wide consensus on the effectiveness of the role of spending and the currency window in the exchange rate of the Iraqi dinar, especially in the Iraqi economy, effectiveness As the increase in government spending lead to an increase in the supply of money and increase domestic demand and high pr
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreMost tubes are made from butyl rubbers, but certain types, such as giant tubes, are based on natural rubber because very high green strength is required when handling the uncured compound. By using blends of natural rubber (NR) and brominated butyl rubber (BIIR), it is possible to maintain high green strength in the uncured compound and improve impermeability and heat resistance of the cured tube. The best formulations are obtained in the presence of 50 phr of (BIIR) to achieve desired mechanical properties. Improved impermeability was obtained by using 50 and 75 phr of (BIIR) rubber in compounds. Blending of brominated butyl rubber (BIIR) with natural rubber (NR) enhances air retention with acceptable sacrifices in green strength.
... Show MoreIn this paper, an adaptive polynomial compression technique is introduced of hard and soft thresholding of transformed residual image that efficiently exploited both the spatial and frequency domains, where the technique starts by applying the polynomial coding in the spatial domain and then followed by the frequency domain of discrete wavelet transform (DWT) that utilized to decompose the residual image of hard and soft thresholding base. The results showed the improvement of adaptive techniques compared to the traditional polynomial coding technique.
A principal problem of any internet user is the increasing number of spam, which became a great problem today. Therefore, spam filtering has become a research fo-cus that attracts the attention of several security researchers and practitioners. Spam filtering can be viewed as a two-class classification problem. To this end, this paper proposes a spam filtering approach based on Possibilistic c-Means (PCM) algorithm and weighted distance coined as (WFCM) that can efficiently distinguish between spam and legitimate email messages. The objective of the formulated fuzzy problem is to construct two fuzzy clusters: spam and email clusters. The weight assignment is set by information gain algorithm. Experimental results on spam based benchmark
... Show More