The railways network is one of the huge infrastructure projects. Therefore, dealing with these projects such as analyzing and developing should be done using appropriate tools, i.e. GIS tools. Because, traditional methods will consume resources, time, money and the results maybe not accurate. In this research, the train stations in all of Iraq’s provinces were studied and analyzed using network analysis, which is one of the most powerful techniques within GIS. A free trial copy of ArcGIS®10.2 software was used in this research in order to achieve the aim of this study. The analysis of current train stations has been done depending on the road network, because people used roads to reach those train stations. The data layers for this study were collected and prepared to meet the requirements of network analyses within GIS. In this study, the current train stations in Iraq were analyzed and studied depending on accessibility value for those stations. Also, to know the numbers of people who can reach those stations within a walking time of 20 minutes. So, this study aims to analyze the current train stations according to multiple criteria by using network analysis in order to find the serviced areas around those stations. Results will be presented as digital maps layers with their attribute tables that show the beneficiaries from those train stations and serviced areas around those stations depending on specific criteria, with a view to determine the size of this problem and to support the decision makers in case of locating new train stations within the best locations for it.
Time series is an important statistical method adopted in the analysis of phenomena, practices, and events in all areas during specific time periods and predict future values contribute to give a rough estimate of the status of the study, so the study aimed to adopt the ARIMA models to forecast the volume of cargo handled and achieved in four ports (Umm Qasr Port, Khor Al Zubair Port, Abu Flus Port, and Maqal Port(, Monthly data on the volume of cargo handled for the years (2006-2018) were collected (156) observations. The study found that the most efficient model is ARIMA (1,1,1).
The volume of go
... Show Moreتعتبر لعبة كرة اليد من الالعاب الفرقية، وان هذه اللعبة تستند الى قاعدة اساسية وهي الاداء الصحيح للمهارات، وللتقدم في هذه اللعبة يجب تعلم وأتقان اداء المهارات للوصول الى مستوى افضل للتعلم، من خلال الدور الذي يؤديه اسلوب نموذج كولب لأنماط التعلم (التكيفي) الذي يعمل على تحديد اسلوب التفكير والمفضل لكل فرد وتاثيره في تعلم مهارة الطبطبة للطالبات، اذ يعمل على ايصال المعلومات والافكار الخاصة باداء المهارة وحس
... Show Moreيحتل موضوع الاستهلاك اهمية كبيرة في الدراسات الاقتصادية في حالتي السلم والحرب وذلك لارتباط هذا الموضوع بالانسان والمجتمع ولكونه احد مؤشرات مستوى الرفاهية الاقتصادية والاجتماعية وتزداد اهمية ضبط حركة هذا المتغير السلوكي والكمي في زمن الحرب اكثر مما هو عليه في حالة السلم، في هذا البحث تم استخدام بيانات احصائية عن الانفاق الاستهلاكي الخاص ونصيب الفرد من الدخل القومي اضافة الى الرقم القياسي لاسعار المس
... Show MoreIraq suffers from lack of water resources supply because the headwaters of the rivers located outside its borders and the influence of upstream countries on the quantities of flowing water, in addition to the increase of pressure on available water as a result of population increase and not adopting the principle of rationalization where misuse and wastage and lack of strategic vision to treat and manage water use in accordance with the economic implications fall. This is reflected fallout on water security and subsequently on national and food security, while the issue of using water resources is development top priority in different countries in the world because of the importance of water effect on the security of indivi
... Show MoreSentiment analysis refers to the task of identifying polarity of positive and negative for particular text that yield an opinion. Arabic language has been expanded dramatically in the last decade especially with the emergence of social websites (e.g. Twitter, Facebook, etc.). Several studies addressed sentiment analysis for Arabic language using various techniques. The most efficient techniques according to the literature were the machine learning due to their capabilities to build a training model. Yet, there is still issues facing the Arabic sentiment analysis using machine learning techniques. Such issues are related to employing robust features that have the ability to discrimina
... Show MoreThe present study aimed to examine the concordance between FISH/CISH techniques for assessment of amplification of her2neu gene in Iraqi breast carcinoma patients. Seventy four (74) Iraqi breast cancer patients were involved at the study from the Histopathology Department at the Central Public Health Laboratory in Bagdad, Iraq. Amplification of HER2neu was detected in (33.8%) by fluorescence in situ hybridization and (13.51%) showed high amplification by chromogenic in situ hybridization and (32.43%) showed low amplification. The results of chromogenic in situ hybridization were significantly correlated with the results of two-color fluorescence in situ hybridization with the same tumors. In addition, the study involved the correlation betw
... Show MoreThe presented study investigated the scheduling regarding jobs on a single machine. Each job will be processed with no interruptions and becomes available for the processing at time 0. The aim is finding a processing order with regard to jobs, minimizing total completion time , total late work , and maximal tardiness which is an NP-hard problem. In the theoretical part of the present work, the mathematical formula for the examined problem will be presented, and a sub-problem of the original problem of minimizing the multi-objective functions is introduced. Also, then the importance regarding the dominance rule (DR) that could be applied to the problem to improve good solutions will be shown. While in the practical part, two
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show More