Preferred Language
Articles
/
alkej-443
A study of Land Zoning in the base of Traffic Noise Pollution Levels using ArcGIS: Kirkuk City as a Case Study
...Show More Authors

This study is an approach to assign the land area of  Kirkuk city [ a city located in the northern of Iraq, 236 kilometers north of  Baghdad  and 83 kilometers  south of  Erbil [ Climatic atlas of  Iraq, 1941-1970  ]  into different  multi zones by using Satellite image and Arc Map10.3,  zones of different traffic noise pollutions. Land zonings process like what achieved in this paper will help and of it’s of a high interest point for the future of Kirkuk city especially urban planning and economic issues of the city. Also, it may be considered as a reference in solving the traffic jam problems in the city. Transportations and sounds of horn of vehicles are the major sources of traffic noise pollutions .Vehicular traffic noise problems are contributed by various types of vehicles such as heavy and medium trucks or buses or automobiles. During this study, six major regions within the city were selected (Governorate region, Baghdad road, Al Wasti, Al Askary, Al Nasir and North garage). A survey for all those six regions were taken place  and noise measurements  were captured at points  or  near to the  intersections  for a duration of three different periods days per a week  [  Sunday 3rd , Monday 4th , and  Tuesday 5th] of January 2016. The results showed  a  high level of noise pollution and super passing on many occasions to the prescribed levels by Central Pollution Control Board (CPCB) , maximum level noise pollution  value was 94.6 dB(A) in AlWasti region near to the road that leading to Kirkuk university , while minimum level noise pollution  value was 48 dB(A) in AlNasir region. As a result, a noise map zoning was prepared for Kirkuk City for top peak working three days. The prepared noise distribution map will help and could be used as a considerable point for the future during designing projects related to transportations. Also in another hand, the map reflected indirectly the amount of regional air pollutions. High distributed noise pollution zones means a zone of a high air pollutions levels specially Cox and Nox gaseous pollutions.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Medicinal Chemistry
New Niflumic Acid Derivatives as EGFR Inhibitors: Design, Synthesis, In silico Studies, and Anti-proliferative Assessment
...Show More Authors
Background:

1,3,4-oxadizole and pyrazole derivatives are very important scaffolds for medicinal chemistry. A literature survey revealed that they possess a wide spectrum of biological activities including anti-inflammatory and antitumor effects.

Objectives:

To describe the synthesis and evaluation of two classes of new niflumic acid (NF) derivatives, the 1,3,4-oxadizole derivatives (compounds 3 and (4A-E) and pyrazole derivatives (compounds 5 and 6), as EGFR tyrosine kinase inhibitors in silico and in vitro.

Methods:

The designed compounds were synthesized using convent

... Show More
View Publication
Scopus (11)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Entrepreneurial performance in accordance with the competitive intelligence and strategic
...Show More Authors

 The research aims to study the entrepreneurial performance of the banks, according to the intelligence of competitive and strategic as the entrepreneurial performance is the one who does not stand the benefits of excellence in accomplished when just achieving the bank's objectives planned, but exceed it down to creativity in accomplishing these goals in a manner leads to making a entrepreneurial bank in the markets and the focus the eyes of competitors and the banks and other Following his example.

Was chosen the subject of research and strategic intelligence and competitive because of its impact on the strategic success of the banking sector, the fact is the entrepreneurial in the Iraqi banking mar

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed May 17 2023
Journal Name
College Of Islamic Sciences
Lessons learned from the personality of Salah al-Din al-Ayyubi and his policy
...Show More Authors

The personality of the hero Salah al-Din al-Ayyubi (may God have mercy on him) came from the womb of jihad after difficult travails that the Arab Islamic nation experienced through the jihad of its loyal and honest sons who vowed themselves to God in defense of his religion and law, so between 490 AH - 540 AH outstanding jihadi leaders emerged who took upon themselves the responsibility of jihad and mobilizing the nation's energies To fight its enemies - the Franks, the Crusaders - in the Levant, and those leaders succeeded in achieving impressive victories over the Frankish military effort and regained some cities that were usurped by the Franks. Balak bin Bahram, Suqman, and Jakarmish, but these leaders could not maintain a state of un

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 19 2018
Journal Name
Journal Of Planner And Development
التنمية الحضرية للمناطق السكنية غير الرسمية/العشوائية المتدهورة في مدينة بغداد
...Show More Authors

View Publication Preview PDF
Publication Date
Wed Dec 19 2018
Journal Name
Journal Of Planner And Development
معوقات تنفيذ المخططات الأساسية بأبعادها التشريعية والقانونية حالة دراسية - مدينة الكوت
...Show More Authors

View Publication Preview PDF
Publication Date
Tue May 24 2022
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Blind Video Copyright Protection Technique in Maximum and Minimum Energy Frames Based on The Fast Walsh Hadamard Transform (FWHT) and Discrete Wavelet Transform (DWT) and Arnold Map
...Show More Authors

Video copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and Arnold Map. The proposed method chooses only frames with maximum and minimum energy features to host the watermark. It also exploits the advantages of both the fast Walsh Hadamard transform (FWHT) and discrete wavelet transforms (DWT) for watermark embedding. The Arnold map encrypts watermarks before the embedding process and decrypts watermarks after extraction. The results show that the proposed method can achieve a fast embedding time, good transparency, and robustness against various

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Effect the Natural Lighting In The Visual Comfort & Workers Satisfaction in Industrial Companies
...Show More Authors

Energy crisis and the requirements of health and feel good, all this renewed attention to the importance of natural lighting in all kinds of factories.
    Research problem was how to achieve the plant's own natural outlets visual comfort and satisfaction of workers in
Companies, the industries of cotton and general al-fedaa.

     The research compuns address the impact of daylight to provide visual comfort in the factory. Indeed, the light must be treated very carefully, and natural lighting should be thinking from the perspective of the occupants of the plant and not wishing to view from the outsid

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 02 2021
Journal Name
Indonesian Journal Of Chemistry
Preparation and Characterization of New Tetra-Dentate N<sub>2</sub>O<sub>2</sub> Schiff Base with Some of Metal Ions Complexes
...Show More Authors

This study describes preparation a new series of tetra-dentate N2O2 dinuclear complexes Cr(III), Co(II)and Cu(II) of the Schiff base 2-[5-(2-hydroxy-phenyl)-1,3,4-thiadiazol-2-ylimino]-methyl-naphthalen-1-ol], (LH2) derived from 1-hydroxy-naphthalene-2-carbaldehyde with 2-amino-5-(2-hydroxy-phenyl)-1,3,4-thiadiazole. These ligands were characterized by FT-IR, UV-Vis, Mass spectra, elemental analysis, and 1H-NMR. All prepared complexes have been characterized by conductance measurement, magnetic susceptibility, electronic spectra, infrared spectrum, thermal Analysis (TGA), and metal analysis by atomic absorption. The stoichiometry of metal to ligand, magnetic susceptibility, and electronic spectra measurements show an octahedral geom

... Show More
View Publication
Scopus (17)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Aug 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Text hiding in text using invisible character
...Show More Authors

Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Steganography in Audio Using Wavelet and DES
...Show More Authors

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr

... Show More
View Publication Preview PDF
Crossref