Preferred Language
Articles
/
jcoeduw-1363
Urban Security in Cities Planning
...Show More Authors

Cities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services which affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban security in the city through planning after making a comprehensive study of the areas to the weakness and strength of the urban area, the result is to achieve an integrated urban environment that can provide the needs of the residents with all their activities and societal components, so the residents will no longer need to cover their needs or to resort to methods that may prejudice urban security in the city in order to meet their needs, or to help urban planning generate a crime in certain places of the city if the study of the spaces is not thoroughly studied. 

View Publication
Publication Date
Thu Jan 02 2020
Journal Name
Arab Science Heritage Journal
الظاهرة اللغوية بين الوص ف والتفسير أث ر المفاهي م الكل ي ة في التوفيق بين الاتجاهين العقلاني والطبيعي في دراس ة اللغ ة البشرية
...Show More Authors

This research investigates modern linguistics in terms of the “universality” concept, through which linguistics shifted its attention from the description of the phenomenon into finding an interpretation of it. Then it investigates what needs interpretation in the language

View Publication Preview PDF
Publication Date
Thu Jan 02 2020
Journal Name
Arab Science Heritage Journal
الظاهرة اللغوية بين الوص ف والتفسير أث ر المفاهي م الكل ي ة في التوفيق بين الاتجاهين العقلاني والطبيعي في دراس ة اللغ ة البشرية
...Show More Authors

This research investigates modern linguistics in terms of the “universality” concept, through which linguistics shifted its attention from the description of the phenomenon into finding an interpretation of it. Then it investigates what needs interpretation in the language

View Publication Preview PDF
Publication Date
Thu Dec 28 2017
Journal Name
Al-khwarizmi Engineering Journal
Obstacles Avoidance for Mobile Robot Using Enhanced Artificial Potential Field
...Show More Authors

In this paper, an enhanced artificial potential field (EAPF) planner is introduced. This planner is proposed to rapidly find online solutions for the mobile robot path planning problems, when the underlying environment contains obstacles with unknown locations and sizes. The classical artificial potential field represents both the repulsive force due to the detected obstacle and the attractive force due to the target. These forces can be considered as the primary directional indicator for the mobile robot. However, the classical artificial potential field has many drawbacks. So, we suggest two secondary forces which are called the midpoint

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
A Comparison Between Classic Local Least Estimatop And Bayesian Methoid For Estimating Semiparametric Logistic Regression Model
...Show More Authors

Semi-parametric models analysis is one of the most interesting subjects in recent studies due to give an efficient model estimation. The problem when the response variable has one of two values either 0 ( no response) or one – with response which is called the logistic regression model.

We compare two methods Bayesian and . Then the results were compared using MSe criteria.

A simulation had been used to study the empirical behavior for the Logistic model , with  different sample sizes and variances. The results using represent that the Bayesian method is better than the   at small samples sizes.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 19 2020
Journal Name
Indonesian Journal Of Chemistry
Determination of Eugenol in Personal-Care Products by Dispersive Liquid-Liquid Microextraction Followed by Spectrophotometry Using <i>p</i>-Amino-<i>N,N</i>-dimethylaniline as a Derivatizing Agent
...Show More Authors

Two simple methods for the determination of eugenol were developed. The first depends on the oxidative coupling of eugenol with p-amino-N,N-dimethylaniline (PADA) in the presence of K3[Fe(CN)6]. A linear regression calibration plot for eugenol was constructed at 600 nm, within a concentration range of 0.25-2.50 μg.mL–1 and a correlation coefficient (r) value of 0.9988. The limits of detection (LOD) and quantitation (LOQ) were 0.086 and 0.284 μg.mL–1, respectively. The second method is based on the dispersive liquid-liquid microextraction of the derivatized oxidative coupling product of eugenol with PADA. Under the optimized extraction procedure, the extracted colored product was determined spectrophotometrically at 618 nm. A l

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of The College Of Languages (jcl)
Le thème de la solitude et la structure narrative dans Le Procès-verbal de Jean Marie Gustave Le Clézio The Theme of Solitude and Narrative Structure in the Novel of “Trail ” of Jean Marie Gustave Le Clézio
...Show More Authors

Abstract

     This paper tackles the theme of alienation as being a concurrent state of human being from birth to death; so extensive is the description of this state by writers. Alienation has been a product of their hard experiences and miserable lives. One such writer is Jean-Marie Gustave le Clézio who was so perfect in describing alienation in his works. Upon so many occasions, he imagined one or more of his characters as living in a chaotic world and so lived safely in alienation. The novel "Le Procès-Verbal" is one of the most important of his works. This paper deals with e the narrative structure of novel while shedding light on the hero's alienation: its essence and causes.

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 28 2021
Journal Name
Journal Of The College Of Education For Women
The Effect of Using the Fear of Failure Motivation Teaching Technique on the Achievement of Students from the Department of the Holy Quran and Its Sciences at Khawlan Faculty of Education in Sana'a University: عبدالغني علي المقبلي
...Show More Authors

Nowadays, university education stands in front of both students who feel they are weak and teachers who are addicted to using traditional and dependent teaching. This has led to have negative repercussions on the learner from different aspects, including the mental aspect and the academic achievement process. Therefore, the present research is concerned with finding a new teaching method that adopts the motivation by the fear of failure technique. Thus, the study aims to examine the effect of adopting this method on students’ academic achievement. To achieve this aim, an experimental method was used, and an achievement test was built for the curriculum material of level two students. The pretest test was applied on 17 male and female s

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Emergency Fuel Rationing system using RFID Smart Cards
...Show More Authors

Rationing is a commonly used solution for shortages of resources and goods that are vital for the citizens of a country. This paper identifies some common approaches and policies used in rationing as well asrisks that associated to suggesta system for rationing fuelwhichcan work efficiently. Subsequently, addressing all possible security risks and their solutions. The system should theoretically be applicable in emergency situations, requiring less than three months to implement at a low cost and minimal changes to infrastructure.

View Publication Preview PDF
Crossref