Millions of pilgrims and visitors from numerous parts of the world flock to Karbala (one of the most prominent ideological and religious places in central Iraq) each year to visit the holy shrines in Karbala due to their sanctity. Many improvements have been made to the Two Holy Shrines (THS), the Shrines of Imam Husayn and Imam Abbas, and the area between them (ATHS), due to the high temperatures in this region and to improve pedestrian thermal comfort. Studies on improving outdoor thermal comfort in Karbala are scarce. Hence, this research aims to look into historical and current architectural changes and how they affect thermal comfort. On the hottest summer day, the ENVI-met software program was used to simulate the building design and calculate the impact of vegetation on outdoor thermal comfort. According to the findings, trees of medium-density in a compacted arrangement should be used nearby built-up structures in newly planned urban regions. In existing urban plots, the best approach is to use free blank areas (e.g. car parks) to set trees of medium-density, as well as plant along large pedestrian and driving routes. Doi: 10.28991/CEJ-2022-08-05-08 Full Text: PDF
The research in the variables of the political process and government stability tried to show the impact of the political process on political stability first, and then on government stability second, given that the political process that was established in 2005 was aimed at achieving legitimacy, and its most prominent tools are elections, leading to achieving political stability, including government stability. The issue of governmental stability is one of the important issues in Iraq, but it has not been achieved, as a result of several factors, including problems in political action, as the political process has not succeeded in leading Iraq to stability.
The research aims to study strategic training and its impact on improving the performance of the inspectors general offices in Iraqi ministries, through two variables strategic training Which include Four Dimensions ( Strategic analysis , Formulation of Training Strategy , Implement the Training Strategy , Evaluation ) and Performance included Three dimensions ( Efficiency , Effectiveness , Added-Value).
This research problem is that the Offices of Inspectors rely on pre-made training Programs received from training centers without designing the training programs that provide the employees with the skills and abilities that lead to the implementation of the current and future goals of the orga
... Show MoreThe purpose of this research is to highlight the relationship between the administrative investigation and the improvement of institutional performance, and the research sought to achieve a set of cognitive and applied goals. the administrative investigation is the modern trend of managing the offices of the general hginspectors and the main source to build the necessary standards to manage and invest its resources efficiently and effectively required to achieve the goals it seeks. The institutional performance is the cornerstone for the implementation of all tasks and duties carried out by institutions operating within the borders of a particular country, The significant change
... Show MoreThis paper aims to study the effects of the long term solar activity on the critical frequencies of ionospheric F1 layer over Baghdad city, during the solar cycle 22, within (1988- 1995). It is found that the critical frequency of this layer is closely related to the sunspots number during the years of the solar cycle 22, at a middle latitude region of the world. The study discussed the effect of sunspot numbers and solar events on the electron densities of F1 layer, which is the most important ionospheric parameter.
يهدف هذا العمل الى بيان طبيعة العلاقة بين الادارة بالتجوال والتجديد الاستراتيجي ، ومدى تأثير المتغير المستقل في المتغير التابع. تضمنت فقرات الاستبانة بوصفه الأداة الرئيسة لجمع البيانات ثلاث جوانب اساسية، تضمن الاول البيانات الشخصية للمستجيبين، فيما تضمن الجانب الثاني الفقرات الخاصة بمتغير الادارة بالتجوال من خلال خمسة ابعاد، فيما اشتمل الجانب الثالث على فقرات التجديد الاستراتيجي عبر تناول اربعة ابعاد. ي
... Show MoreThis work aims to show the nature of the relationship between management by walking around (the independent variable) and strategic renewal (the dependent variable), as well as it shows the effect of the independent variable on the dependent variable. Questionnaire items were considered the main tool for data collection by three basic aspects. The first involved the personal data of the respondents, while the second included items related to management by walking in five dimensions, and the third is strategic renewal items by addressing four dimensions. The tourism sector, while the community has six Excellent grade hotels was taken into account in this wor
... Show MoreA new colorimetric-flow injection method has been developed and validated for the detection of Cefotaxime sodium in pharmaceutical formulations. This method stands out for its rapid and sensitive nature. The formation of a brown-colored complex between Cefotaxime sodium and the Biuret reagent in a highly alkaline environment serves as the basis for the detection. The intensity of this colored complex is measured using a custom-built Continuous Flow Injection Analyzer, enabling accurate quantification of Cefotaxime sodium. Optimization studies of the chemical and physical parameters such as dilution of Biuret reagent, effect of the medium basicity, flow rate, sample loop and others have been investigated. The calibration gra
... Show MoreSymmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show More