The research presented the experience of creating a new sustainable city, and this experience of establishing an Eco-City (Environmentally friendly) is considered the first experience in Iraq. The current study stressed the importance of the need for environmental planning in the early stages of planning new cities based on realism in planning, design and implementation. Subsequently, that aims to preserve the ecosystem, which is difficult to compensate if degraded or polluted. The research incorporated environmental planning indicators within sustainable urban planning (Reliance on generating electric power that is based on clean and renewable energy sources, Availability of public transport services and pedestrian paths, providing green and open areas, approval the principle of mixed use of urban land; reuse of treated wastewater for various urban usages, as well as an interest in solid waste management and recycling residual wastes. Community participation, intensification and compactness within urban areas are evaluating by indicators conducting statistical analysing, and discussing results within methods and strategies of sustainable urban planning and their compatibility for implementation in new cities in Iraq. The main research contribution was to plan a new Eco-City integrated and comprehensive, healthy and liveable city that provides comfort and luxury to residents, taking into account environmental planning. Another contribution is presenting by eliminating informal housing and reducing pressure on social and technical services within the existing Samawah city, especially study area is adjacent to Samawah existing city.
Two series of bent core mesogen containing 1,2,4-traizole ring [X]a-e and [XI]a-e were synthesized by many steps starting from esterification of isophthalic acid with methanol to yield diester compound [I] which was converted to their acid hydrazide [II] and the acid hydrazide reacted with ammonium thiocyanate or phenyl isothiocyanate to yield compounds [III] and [IV] , respectively . Then cyclization by 4% NaOH to yielded 1,2,4 traizole-3- thiol compounds [V] and [VI], respectively, afterword adding hydrazine hydrate to yield compounds [VII] and [VIII] .These compounds condensated with different substituted aldehyde to give new Schiff bases[X]a-e and [XI]a-e,respectively. The synthesized compounds were characterized by melting points ,
... Show MoreObjective: Benzoxazole derivatives have antifungal, anticancer, antibacterial, and anticonvulsant function. Encouraged by this comment, we agreed to synthesize new Benzoxazole compounds connected to the bases of Schiff's. Methods: 2,4-diaminophenol (1) was prepared by the reaction of 2,4-dinitrophenol and sodium dithionate. Compound (1) reacted with either acetic acid to afford compound (2) or with formic acid to afford compound (3). The Schiff bases were preparation from the reaction condensing reaction of compound (2) or (3) and aromatic aldehydes or ketone; [p-nitrobenzaldehyde, p-hydroxybenzaldehyde, p-chlorobenzaldehyde, p-bromoacetophenone and terephthaldehyde]. Results: FTIR and 1H-NMR spectroscopy characterized all of the pr
... Show MoreThe new ligand [3,3’-(1,2-phenylenebis(azanediyl))bis(5,5-dimethylcyclohex-2-en-1-one)] (L) derived from 5,5-Dimethylcyclohexane-1,3-dione with 1,2-phenylenediamine was used to prepare a new chain of metal complexes of Mn(ii), Co(ii), Ni(ii), Cu(ii), Cd(ii) and Zn(ii) by inclusive formula [M(L)]Cl2. Characterized compounds on the basis of 1H, 13CNMR (for ligand (L)), FT-IR and U.V spectrum, melting point, molar conduct, %C, %H and %N, the percentage of the metal in complexes %M, Magnetic susceptibility, thermal studies (TGA), while its corrosion inhibition for (plain steel) in tap water is studied by weight loss. These measurements proved th
This paper presents a combination of enhancement techniques for fingerprint images affected by different type of noise. These techniques were applied to improve image quality and come up with an acceptable image contrast. The proposed method included five different enhancement techniques: Normalization, Histogram Equalization, Binarization, Skeletonization and Fusion. The Normalization process standardized the pixel intensity which facilitated the processing of subsequent image enhancement stages. Subsequently, the Histogram Equalization technique increased the contrast of the images. Furthermore, the Binarization and Skeletonization techniques were implemented to differentiate between the ridge and valley structures and to obtain one
... Show MoreIn this study, we have created a new Arabic dataset annotated according to Ekman’s basic emotions (Anger, Disgust, Fear, Happiness, Sadness and Surprise). This dataset is composed from Facebook posts written in the Iraqi dialect. We evaluated the quality of this dataset using four external judges which resulted in an average inter-annotation agreement of 0.751. Then we explored six different supervised machine learning methods to test the new dataset. We used Weka standard classifiers ZeroR, J48, Naïve Bayes, Multinomial Naïve Bayes for Text, and SMO. We also used a further compression-based classifier called PPM not included in Weka. Our study reveals that the PPM classifier significantly outperforms other classifiers such as SVM and N
... Show MoreTI1e Web service securi ty challenge is to understand and assess the risk involved in securing a web-based service today, based on our existing security technology, and at the same time tmck emerging standards and understand how they will be used to offset the risk in
new web services. Any security model must i llustrate how data can
now through an application and network topology to meet the
requirements defined by the busi ness wi thout exposing the data to undue risk. In this paper we propose &n
... Show MoreThe aim of this paper is to propose an efficient three steps iterative method for finding the zeros of the nonlinear equation f(x)=0 . Starting with a suitably chosen , the method generates a sequence of iterates converging to the root. The convergence analysis is proved to establish its five order of convergence. Several examples are given to illustrate the efficiency of the proposed new method and its comparison with other methods.
This paper is concerned with introducing and studying the first new approximation operators using mixed degree system and second new approximation operators using mixed degree system which are the core concept in this paper. In addition, the approximations of graphs using the operators first lower and first upper are accurate then the approximations obtained by using the operators second lower and second upper sincefirst accuracy less then second accuracy. For this reason, we study in detail the properties of second lower and second upper in this paper. Furthermore, we summarize the results for the properties of approximation operators second lower and second upper when the graph G is arbitrary, serial 1, serial 2, reflexive, symmetric, tra
... Show MoreThere are many researches deals with constructing an efficient solutions for real problem having Multi - objective confronted with each others. In this paper we construct a decision for Multi – objectives based on building a mathematical model formulating a unique objective function by combining the confronted objectives functions. Also we are presented some theories concerning this problem. Areal application problem has been presented to show the efficiency of the performance of our model and the method. Finally we obtained some results by randomly generating some problems.
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show More