The rapid growth of cities and their inflation is a big problem, especially in the last years. this growth is accompanied by such problems like population growth, housing need, low level of services, random expansion, traffic congestion as well as pollution of the environment, which leads to a decline in the quality of life in Baghdad, the population are concentration in Baghdad therefore that leads to imbalance of development among cities and productive concentration for service projects in a mega cities, causing migration from other provinces In search of a better life. The main objective of the new cities is to relieve pressure on major cities and guide the growth of cities. Basmaya city it’s a new city project adopted from Iraqi national investment commission, this paper aimed to strategic analysis of this city and evaluate the real situation for this project by internal environment analysis, external environment analysis in addition to measurement of performance strategic gaps.
Varied uses of international rivers in the past few decades dramatically, resulting in this multiplicity of uses and all associated with it for the occurrence of freshwater scarcity activities, and thus an increase in conflicts and disputes around on the rights of each of the riparian countries to benefit from the waters of the river at various purposes, particularly the establishment of dams on some of them as is the case (Renaissance Ethiopian) big impact on downstream countries Dam (Egypt and Sudan), due to the Oukuahma at the end of the Nile Valley made them vulnerable to environmental fluctuations, political crises facing the Nile basin countries, and any reduction in the proportion of water is not only the Nile River, but for all r
... Show MoreThe zeolite's textural properties have a significant effect on zeolite's effectiveness in the different industrial processes. This research aimed to study the textual properties of the NaX and FeX zeolites using the nitrogen adsorption-desorption technique at a constant low temperature. According to the International Union of Pure and Applied Chemistry, the adsorption-desorption isotherm showed that the studied materials were mixed kinds I/II isotherms and H3 type hysteresis. The Brunauer-Emmett-Teller isotherm was the best model to describe the nitrogen adsorption-desorption better than the Langmuir and Freundlich isotherms. The obtained adsorption capacity and Brunauer-Emmett-Teller surface area values for NaX were greater than FeX. Ac
... Show More In this paper the research represents an attempt of expansion in using the parametric and non-parametric estimators to estimate the median effective dose ( ED50 ) in the quintal bioassay and comparing between these methods . We have Chosen three estimators for Comparison. The first estimator is
( Spearman-Karber ) and the second estimator is ( Moving Average ) and The Third estimator is ( Extreme Effective Dose ) . We used a minimize Chi-square as a parametric method. We made a Comparison for these estimators by calculating the mean square error of (ED50) for each one of them and comparing it with the optimal the mean square
The actual observations for Jupiter radio storm were taken for Hawaii station within multi years from 2001 to 2012. The Central Meridian Longitude (CMLІІІ) and Io's phase (γIo) were calculated for each year from Radio Jove program, the results of CMLІІІ for year 2006 was A=(180-300)º,B=(15-239)º, C=(60-280)º, phase was A=(182-260)º,B=(40-109)º, C=(200-260)º, which were close to the theoretical values, longitude was A=(180-300)º, B=(15-240)º, C=(60-280)º and phase was A=(180-260)º,B=(40-110)º and C=(200-260)º.
The problem of the current research addressed the close link between the psychological stress and social isolation as behavior and experience, as well as, the stress of the displaced pupils by the sense of alienation and isolation from the society to which they had moved. It reflects a sense of mystery to the displaced pupils about their lives in the present and future. Therefore, the current research aims to identify the psychological presence and the level of social isolation among secondary school displaced pupils and identify whether there were statistically significant differences in the variables between the displaced pupils (males-females). Moreover, it attempts to identify the relationship between psychological stress and social
... Show MoreThe specimens of Camponotusxerxes Forel, 1904 were collected from different localities in Iraq; the purpose of morphological study of this species in details throughout the present study.
The description was based on major workers belonging to this species, also some notes of polymorphism in workers have been mentioned; the most important of morphological features are illustrated and figured.
This paper delves into the significant role played by local social and traditional structures in shaping Traditional Community Tenure (TCT) within Iraqi Land Tenure Legislation (ILTR), and examines their impact on gender inequalities, with a specific focus on women's land tenure rights. The methodological approach employed in this study identified the sources of barriers to gender equality within TCT as outlined in ILTR at two different bilateral levels, with input obtained from key stakeholders in a selected city in Iraq. The case study survey encompassed three districts, which served as local layers within the historic sectors of the Iraqi city of Al-Nasiriya. the study employed quantitative methods, including a household surveyو with
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More