This research include design and implementation of an Iraqi cities database using spatial data structure for storing data in two or more dimension called k-d tree .The proposed system should allow records to be inserted, deleted and searched by name or coordinate. All the programming of the proposed system written using Delphi ver. 7 and performed on personal computer (Intel core i3).
The current research aims to develop the skills of the kindergarten students in designing and implementing a theater for gauntlets made of cardboard materials. To study this, the researcher determined to build teaching plans for design and implementation skills according to (Kolb model).
The results of this research showed the effectiveness of teaching plans according to (Kolb's model) in developing skills of design and implementation (theater for gauntlets made of cardboard materials) for the students of the Kindergarten Department - the experimental group. Which had a positive effect to reach the desired results in the design and implementation of the gauntlet theater and dealing with cardboard materials
Pharmaceutical care is a patient-centered, outcomes oriented practice that requires the pharmacist to work in concert with the patient and the patient’s other healthcare providers to promote health, to prevent disease, and to assess, monitor, initiate, and modify medication use to assure that drug therapy regimens are safe and effective. In addition, the presence of clinical pharmacists has led to a higher quality of patient education and provision of complete detailed information for patients. In developed countries Pharm D has become the professional degree for practice of Pharmacy. The graduates will be enrolled in a pharmacy residency program; admission to the residency programs is available to Pharm D graduates of an accredit
... Show MoreClassical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show MoreCities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services that affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban securi
... Show MoreCities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services which affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban secur
... Show MoreThe rapid growth of cities and their inflation is a big problem, especially in the last years. this growth is accompanied by such problems like population growth, housing need, low level of services, random expansion, traffic congestion as well as pollution of the environment, which leads to a decline in the quality of life in Baghdad, the population are concentration in Baghdad therefore that leads to imbalance of development among cities and productive concentration for service projects in a mega cities, causing migration from other provinces In search of a better life. The main objective of the new cities is to relieve pressure on major cities and guide the growth of cities. Basmaya city it’s a new city project adopted f
... Show MoreImage compression plays an important role in reducing the size and storage of data while increasing the speed of its transmission through the Internet significantly. Image compression is an important research topic for several decades and recently, with the great successes achieved by deep learning in many areas of image processing, especially image compression, and its use is increasing Gradually in the field of image compression. The deep learning neural network has also achieved great success in the field of processing and compressing various images of different sizes. In this paper, we present a structure for image compression based on the use of a Convolutional AutoEncoder (CAE) for deep learning, inspired by the diversity of human eye
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreA load-shedding controller suitable for small to medium size loads is designed and implemented based on preprogrammed priorities and power consumption for individual loads. The main controller decides if a particular load can be switched ON or not according to the amount of available power generation, load consumption and loads priorities. When themaximum allowed power consumption is reached and the user want to deliver power to additional load, the controller will decide if this particular load should be denied receiving power if its priority is low. Otherwise, it can be granted to receive power if its priority is high and in this case lower priority loads are automatically switched OFF in order not to overload the power generation. The
... Show More