The railways network is one of the huge infrastructure projects. Therefore, dealing with these projects such as analyzing and developing should be done using appropriate tools, i.e. GIS tools. Because, traditional methods will consume resources, time, money and the results maybe not accurate. In this research, the train stations in all of Iraq’s provinces were studied and analyzed using network analysis, which is one of the most powerful techniques within GIS. A free trial copy of ArcGIS®10.2 software was used in this research in order to achieve the aim of this study. The analysis of current train stations has been done depending on the road network, because people used roads to reach those train stations. The data layers for this study were collected and prepared to meet the requirements of network analyses within GIS. In this study, the current train stations in Iraq were analyzed and studied depending on accessibility value for those stations. Also, to know the numbers of people who can reach those stations within a walking time of 20 minutes. So, this study aims to analyze the current train stations according to multiple criteria by using network analysis in order to find the serviced areas around those stations. Results will be presented as digital maps layers with their attribute tables that show the beneficiaries from those train stations and serviced areas around those stations depending on specific criteria, with a view to determine the size of this problem and to support the decision makers in case of locating new train stations within the best locations for it.
In the literature, several correlations have been proposed for hold-up prediction in rotating disk contactor. However,
these correlations fail to predict hold-up over wide range of conditions. Based on a databank of around 611
measurements collected from the open literature, a correlation for hold up was derived using Artificial Neiral Network
(ANN) modeling. The dispersed phase hold up was found to be a function of six parameters: N, vc , vd , Dr , c d m / m ,
s . Statistical analysis showed that the proposed correlation has an Average Absolute Relative Error (AARE) of 6.52%
and Standard Deviation (SD) 9.21%. A comparison with selected correlations in the literature showed that the
developed ANN correlation noticeably
E-Health care system is one of the great technology enhancements via using medical devices through sensors worn or implanted in the patient's body. Wireless Body Area Network (WBAN) offers astonishing help through wireless transmission of patient's data using agreed distance in which it keeps patient's status always controlled by regular transmitting of vital data indications to the receiver. Security and privacy is a major concern in terms of data sent from WBAN and biological sensors. Several algorithms have been proposed through many hypotheses in order to find optimum solutions. In this paper, an encrypting algorithm has been proposed via using hyper-chaotic Zhou system where it provides high security, privacy, efficiency and
... Show MoreThe com pton profiles for Ti02 have been measured using a SCi
Am-241 compton spectrometer .A pellet of the oxide was prepared from a polycrystalline powder having a thickness of 1.54 mm ,about J 00000 counts have been accumulated at the compton peak
.Theoreti cal compton profiles have been calculated for different ionic anangements using free atom compton profile for the core electrons.The theoretical and experimental results ahrce well for (Ti/4(0 .2 arrangement which support complete transfer of valence electrons from metal to oxygen ions, i.e., full ionic &nbs
... Show MoreFor the most reliable and reproducible results for calibration or general testing purposes of two immiscible liquids, such as water in engine oil, good emulsification is vital. This study explores the impact of emulsion quality on the Fourier transform infrared (FT-IR) spectroscopy calibration standards for measuring water contamination in used or in-service engine oil, in an attempt to strengthen the specific guidelines of ASTM International standards for sample preparation. By using different emulsification techniques and readily available laboratory equipment, this work is an attempt to establish the ideal sample preparation technique for reliability, repeatability, and reproducibility for FT-IR analysis while still considering t
... Show MoreTwo methods were established to separate cobalt from the spent catalyst CoMo which also contain Co, Al and Fe. The first method was the precipitation technique by controlling the pH. At pH 5, 76% of the cobalt which was collected with 1.4% Al and 0.5% Fe as contaminants. The second method was the anion exchange by using Amberlite 400 resin, 100% of the cobalt and was collected with 99.46% purity.The only contaminant was Fe with 0.54% with no Al. For a large scale production of cobalt from this spent catalyst, a batch process was designed with a production of 80 grams per batch by using the anion exchange technique. Kilograms quantities of Co were collected.
The study aims to find out the effectiveness of using the Google classroom educational platform in teaching mathematics curricula from the viewpoint of teachers in the Governorate of Al Dhahirah, Sultanate of Oman. The researcher adopted the descriptive-analytical approach. To collect the needed data, a questionnaire of two dimensions was used. It includes (13) items to measure the effectiveness of using the Google classroom in teaching mathematics curricula from the teacher's point of view and includes (10) items to measure the difficulties of using the Google classroom in teaching mathematics curricula from the teachers' point of view. These tools were applied to (32) male and (31) female as the study sample. They represent mathematics
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreВ статье рассматривается вопрос об использовании мультимедийных средств для оптимизации процесса формирования коммуникативной компетенции в иракской аудитории с привлечением компьютерных технологий. Статья посвящена использованию мультимедийных технологий и различных приемов формирования интереса к русскому языку. Включение в процесс обучения коммуникативно-значимого, аутентичн
... Show More