A Geographic Information System (GIS) is a computerized database management system for accumulating, storage, retrieval, analysis, and display spatial data. In general, GIS contains two broad categories of information, geo-referenced spatial data and attribute data. Geo-referenced spatial data define objects that have an orientation and relationship in two or three-dimensional space, while attribute data is qualitative data that can be counted for recording and analysis. The main aim of this research is to reveal the role of GIS technology in the enhancement of bridge maintenance management system components such as the output results, and make it more interpretable through dynamic colour coding and more sophisticated visualization techniques than the conventional tabular data format. To achieve the main objective of this research, two study areas have been chosen: the old constructionbridge (Al-Qadisiyah bridge) and the newly constructed bridge (Barboty bridge). Both of them are in Al-Muthanna city \ Iraq. The data collection process was achieved in two stages: the first stage is providing a georeferenced satellite image for each study area for the purpose of producing a two-dimensional map. The second stage includes the field surveying process by total station and level instruments. GIS have been used to create a comprehensive database (Geodatabase) for both study areas. Geostatistical analysis was carried out in which the settlement areas of both study areas were defined by producing a colour image. The statistical tables for these analyses showed that the highest decline in the elevation reached at Al-Qadisiyah bridge to 19 mm in the middle of the bridge which is coloured as a red areas. On the other hand, it was found that the highest decline in the elevation of the Barboty bridge is 16 mm in the last part of steel space which is also coloured as a red areas.
The aim of the research is to identify the extent of the ability to ensure the integrated reports by the auditor in verifying the credibility of these reports, and their implications for the benefit of all parties dealing with the economic unit, as well as measuring the impact of the assurance procedures followed by the auditors and their role in confirming these reports.
The research methodology was designed after studying the previous literature related to the research variables, and then the relationship between these variables was tested, through the use of a questionnaire list. A questionnaire targeting the community of auditors in the local environment, and the results of the study wer
... Show MoreNitrogen (N) is a key growth and yield-limiting factor in cultivated rice areas. This study has been conducted to evaluate the effects of different conditions of N application on rice yield and yield components (Shiroudi cultivar) in Babol (Mazandaran, Iran) during the 2015- 2016 season. A factorial experiment executed of a Randomized Complete Block Design (RCBD) used in three iterations. In the first factor, treatments were four N amounts (including 50, 90, 130, and 170 kg N ha-1), while in the second factor, the treatments consisted of four different fertilizer splitting methods, including T1:70 % at the basal stage + 30 % at the maximum tillering stage, T2:1/3 at the basal stage + 1/3 at the maximum ti
... Show MoreInformation systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of
... Show More
ABSTRACT:
The study aimed to identify the impact of the role of voluntary accounting disclosure in enhancing confidence in the informational content of financial reports. Correlation - Spearman to measure the degree of correlation, as well as the method of simple linear regression analysis, and the study reached several results, including: The level of enhancing the information content in the annual financial reports of the Palestinian banks listed on the Palestine Exchange under study reached the overall average (total) (94.1%), and also Voluntary Accounting Disclosure in Enhancing Confidence in the Informational Content of the List of Change in Ownership Equity of Listed
... Show MoreObjectives: To assess the information of mothers regarding asthmatic child care, and to find out the relationship between information of mothers and some of demographic characteristic such as age of mothers, Level of education, and away of child feeding. Methodology: Quantitative design (a descriptive study) was conducted in pediatric hospital in Kirkuk city from the period of first of July 2011 to the end of March 2012. To achieve the objectives of the study, non probability sample of (50) mothers having asthmatic children who attend to the pediatric hospital. The data are collected through utilization
Abstract
Drug information resources are the information that is used in medications discovery, utilization, and management. Little information about different types of resources used by Iraqi community pharmacists is known. Therefore, the objectives were to determine drug information resources' type do the pharmacists used and the common drug information questions they faced during their work in community pharmacy. A cross-sectional descriptive study was conducted in different Iraqi provinces and online self-reported survey was introduced through Google Form Software to an appropriate sample of graduated pharmacists who were working in a private community pharmacy and having at least one
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show More