Developing smart city planning requires integrating various techniques, including geospatial techniques, building information models (BIM), information and communication technology (ICT), and artificial intelligence, for instance, three-dimensional (3D) building models, in enabling smart city applications. This study aims to comprehensively analyze the role and significance of geospatial techniques in smart city planning and implementation. The literature review encompasses (74) studies from diverse databases, examining relevant solutions and prototypes related to smart city planning. The focus highlights the requirements and preparation of geospatial techniques to support the transition to a smart city. The paper explores various aspects, such as the advantages and challenges of geospatial techniques, data collection and analysis methodologies, and case studies showcasing successful implementations of smart city initiatives. The research concludes that geospatial techniques are instrumental in driving the development of smart cities. By analyzing and synthesizing the outcomes of the reviewed articles, this study establishes the essential contribution of geospatial techniques in successfully realizing the vision of smart cities.
Purpose: To identify the size of the food gap for the main agricultural products and crops in Iraq, which reflects to us the extent to which agricultural production in particular and the agricultural sector in general have declined.Theoretical framework: The theoretical side of the research dealt with the definition of self-sufficiency and the food gap, as well as identifying the reality of agricultural production in Iraq during the study period, as well as the reality of the food gap for the most important agricultural, plant and animal products.Design/methodology/approach: In reviewing the research problem, the researcher adopted the method of deductive and descriptive analysis based on the presentation and detail of official data
... Show MoreBackground: White-spot lesion is one of the problems associated with the fixed orthodontic treatment. The aims of this in-vitro study were to investigate enamel damage depth on adhesive removal when the adhesive were surrounded by sound, demineralized or demineralized enamel that had been re-mineralized prior to adhesive removal using 10% Nano-Hydroxy apatite and to determine the effect of three different adhesive removal techniques. Materials and methods: Composite resin adhesive (3M Unitek) was bonded to 60 human upper premolars teeth which were randomly divided in to three groups each containing ten sound teeth and ten teeth with demineralized and re-mineralized lesions adjacent to the adhesive. A window of 2 mm was prepared on the bucca
... Show MoreThe study aims to explore the effect of cognitive behavioral therapy on internet addiction among university students. The experimental method was used. The study population consisted of (100) university students (50 males, 50 females). The Research sample included (13) University students at Baghdad University addicted to the Internet (9 males, 4 females), divided into two groups: a control group consisting of (6) individuals (4 males, 2 females) and an experimental sample consisting of (6) individuals (4 males, 2 females). The Scale of Internet Addiction by Young (1996), which was translated and modified into the Arabic language by (Moegel and Prism, 2016), was administered to the study sample. The sample was subjected to two sess
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show MoreNAA Mustafa, Journal of the Sixth Conference of the Faculty of Languages, 2010
Programs directed to children through the media in general and in television in particular are among the main factors that help in forming the cultural and educational values of this important segment of society, and in light of this the study problem was identified in answering a major question: What are the cultural and educational values that Ajyal channel seeks Space planted in children through my program, Iftah Ya Simsim (in its new season) and Friends of Ajyal? , While the objectives of the study were evident in identifying the most prominent cultural and educational values that the Ajyal satellite channel worked to instill in children, and identifying the nature of the techniques used by Ajyal channel in providing the value conten
... Show MoreThis paper aims to develop a technique for helping disabled people elderly with physical disability, such as those who are unable to move hands and cannot speak howover, by using a computer vision; real time video and interaction between human and computer where these combinations provide a promising solution to assist the disabled people. The main objective of the work is to design a project as a wheelchair which contains two wheel drives. This project is based on real time video for detecting and tracking human face. The proposed design is multi speed based on pulse width modulation(PWM), technique. This project is a fast response to detect and track face direction with four operations movement (left, right, forward and stop). These opera
... Show MoreThe significant shortage of usable water resources necessitated the creation of safe and non-polluting ways to sterilize water and rehabilitate it for use. The aim of the present study was to examine the ability of using a gliding arc discharge to inactivate bacteria in water. Three types of Bacteria satisfactory were used to pollute water which are Escherichia coli (Gram-negative), Staphylococcus aurous (Gram-positive) and salmonella (Gram-negative). A DC power supply 12V at 100 Hz frequency was employed to produce plasma. pH of water is measured gradually during the plasma treatment process. Contaminated water treated by gliding arc discharge at steadying the gas flow rate (1.5 l/mi