The railways network is one of the huge infrastructure projects. Therefore, dealing with these projects such as analyzing and developing should be done using appropriate tools, i.e. GIS tools. Because, traditional methods will consume resources, time, money and the results maybe not accurate. In this research, the train stations in all of Iraq’s provinces were studied and analyzed using network analysis, which is one of the most powerful techniques within GIS. A free trial copy of ArcGIS®10.2 software was used in this research in order to achieve the aim of this study. The analysis of current train stations has been done depending on the road network, because people used roads to reach those train stations. The data layers for this study were collected and prepared to meet the requirements of network analyses within GIS. In this study, the current train stations in Iraq were analyzed and studied depending on accessibility value for those stations. Also, to know the numbers of people who can reach those stations within a walking time of 20 minutes. So, this study aims to analyze the current train stations according to multiple criteria by using network analysis in order to find the serviced areas around those stations. Results will be presented as digital maps layers with their attribute tables that show the beneficiaries from those train stations and serviced areas around those stations depending on specific criteria, with a view to determine the size of this problem and to support the decision makers in case of locating new train stations within the best locations for it.
Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.
This study came for the reason that some project administrations still do not follow the appropriate scientific methods that enable them to perform their work in a manner that achieves the goals for which those projects arise, in addition to exceeding the planned times and costs, so this study aims to apply the methods of network diagrams in Planning, scheduling and monitoring the project of constructing an Alzeuot intersection bridge in the city of Ramadi, as the research sample, being one of the strategic projects that are being implemented in the city of Ramadi, as well as being one of the projects that faced during its implementation Several of problems, the project problem was studied according to scientific methods through the applica
... Show MoreIn information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show MoreTax information system is one of the most important means that help the tax administration to reach the real income of the taxpayer, and the problem of research came in the General Authority for Tax ,The next question (Does the control carried out by the Central Bank on foreign remittances to reach the real income of the taxpayer). The research is gaining importance by focusing on the Central Bank's control over foreign remittances, and how to use this control to finance the tax information system. The relationship between the Central Bank's control over foreign remittances and the tax information system.The study has reached a number of recommendations, the most important of which are the following: The work of an integrated information
... Show MoreThe purpose of this research is to determine the extent to which independent auditors can audit the requirements of e-commerce related to (infrastructure requirements, legislation and regulations, tax laws, and finally human cadres). To achieve this, a questionnaire was designed for auditors. Numerous statistical methods, namely arithmetic mean and standard deviation, have been used through the implementation of the Statistical Packages for Social Sciences (SPSS) program.
The research has reached several results, the most important of which are: There are noobstacles to enabling the auditor to audit the application of the e-commerce requirements as well as the respective(infrastructure requirements, legislation and regulations, t
... Show MoreThis study aimed at investigating the effect of using computer in
Efficiency of Training Programme of Science Teachers in Ajloun District in
Jordan.
1- What is the effect of using computer in program for the two groups
2- ( the experimental and control group ) .
3- Are there any statistics different in the effect of using computer
program for the two groups ?
4- Are there any statistics (comparison ) or different of the effect of the
effect of using computer program refer to the sex (male or female )?
The community of the study consisted of all the science student in
educational directorate of Ajloun district for the academic year 2009 –
2010, they are (120) ( male and female) . The sample of the study<
Background: The isthmus is a difficult area in the root canal complex to manage. The research aimed to evaluate the efficiency of three different obturation techniques (lateral condensation, EandQ (thermoplasticized gutta percha system) and Soft Core (thermoplasticized core carrier gutta percha system)) to obturate the isthmus area of roots prepared by two different instrumentation techniques (rotary ProTaper universal and ProTaper Next systems). Material and method: Sixty freshly extracted teeth were randomly divided into two main groups (A and B) of 30 teeth each. Group A was prepared by rotary ProTaper Universal whereas group B was prepared by ProTaper Next system. Each main group was then randomly subdivided into three subgroups of 10 t
... Show MoreThe research aimed to study the role that the media play in shaping the public knowledge of human rights issues among the people of Kirkuk, which will be the focus of the study. The research was conducted by applying a survey panel to a random sample of the city's audience. The research dealt with the theoretical aspect of a theory that relied on the media, and the loans provided by the theory, on the basis of which the research was conducted and the research problem was determined based on a major question: What is the role that the mass media play in developing the knowledge of members of the public on human rights and the relationship between the intensity of view in that, as well as the identification of the effect of two variables G
... Show More