Preferred Language
Articles
/
jmracpc-235
VISUAL CONTAMINATION WITH RANDOM ADVERTISEMENTS AND THE POSSIBILITY OF APPLYING FINES TO THEIR OWNERS: VISUAL CONTAMINATION WITH RANDOM ADVERTISEMENTS AND THE POSSIBILITY OF APPLYING FINES TO THEIR OWNERS
...Show More Authors

Baghdad governorate has many areas of distinctive architectural and architectural character, which are heritage and valuable areas that we must preserve and take care of. But we see many manifestations of it, which have a negative impact on buildings, areas and roads, so that they distort the view and thus lead to visual pollution in general. The research examined the visual pollution from random advertising, which stretched buildings, walls, electricity poles and sidewalks. The study covered different areas of al-Karkh and al-Rassafa (Jadreya Bridge, Nation Square, Jordan Square, alkindy Street)Most of the distortions were the result of non-removable posters, Handwriting, election candidate advertisements or repeated advertisements. Then we could be reached to the advertis by the phone shown in the advertisement, the location of the advertiser or the advertiser's character and the imposition of financial fines for the purpose of removing the advertisement and not repeating it in the future.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 29 2014
Journal Name
Information And Knowledge Management
Applying Electronic Commerce for a Proposed Virtual Organization
...Show More Authors

Virtual organization is similar to traditional organization in principles, but is different in the ways it operates. It requires small creation costs compared to the traditional and it uses electronic commerce as the market place and distribution channel for its products and services.The aim of this article is to applying electronic commerce for a proposed virtual organization. The tools used to build an effective web application for virtual organization to provide virtual environment to the customers to do the transaction activities online include PHP, MySQL and Apache. HTML is used for displaying forms and tables and JavaScript is used for verification in client side. Finally, connecting it to 2Checkout.com company as a third party to per

... Show More
Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Professional Safety
Designer’s liability: Why applying PTD principles is necessary
...Show More Authors

Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
An edge detection algorithm matching visual contour perception
...Show More Authors

For several applications, it is very important to have an edge detection technique matching human visual contour perception and less sensitive to noise. The edge detection algorithm describes in this paper based on the results obtained by Maximum a posteriori (MAP) and Maximum Entropy (ME) deblurring algorithms. The technique makes a trade-off between sharpening and smoothing the noisy image. One of the advantages of the described algorithm is less sensitive to noise than that given by Marr and Geuen techniques that considered to be the best edge detection algorithms in terms of matching human visual contour perception.

View Publication Preview PDF
Publication Date
Wed Sep 11 2024
Journal Name
Edelweiss Applied Science And Technology
Learning styles according to Entwistle model and their relationship to mathematical excellence among scientific fifth-grade female students
...Show More Authors

The objective of the present study is to determine the nature and direction of the correlation between mathematical excellence and learning styles as defined by the Entwistle, model in fifth-grade scientific female students. The descriptive correlational approach was implemented by the two researchers to accomplish the research objectives. A scale was developed to assess the learning styles of female students in the sample in accordance with the Entwistle, model. : (Knowledge, understanding, application, analysis, synthesis, evaluation, systematic thinking, creativity), and the research community was determined by the female students of the scientific fifth grade in the morning preparatory and secondary schools of the General Direct

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Nov 01 2022
Journal Name
Standards
Observation of a Signal Suppressing Effect in a Binary Mixture of Glycol-Water Contamination in Engine Oil with Fourier-Transform Infrared Spectroscopy
...Show More Authors

An in-depth experimental study of the matrix effect of antifreeze (ethylene glycol) and water contamination of engine oil through FT-IR spectroscopy. With a comparison of the percent by volume concentration of contaminated fresh 15W-40 engine oil, there appeared to be a noticeable reduction in the O–H stretching signal in the infrared spectrum when ethylene glycol based antifreeze was included as a contaminant. The contaminants of distilled water, a 50/50 mixture of water and commercial ethylene glycol antifreeze, and straight ethylene glycol antifreeze were compared and a signal reduction in the O–H stretch was clearly evident when glycol was present. Doubling the volume of the 50/50 mixture as compared to water alone still res

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Iraqi Geological Journal
Assessment of heavy metals contamination and sediment quality in shatt al-arab river, S Iraq
...Show More Authors

Preview PDF
Scopus (16)
Scopus
Publication Date
Wed Mar 29 2023
Journal Name
Aip Conference Proceedings
(𝓹,𝔼)-convex sets and (𝓹,𝔼)-Convex functions with their properties
...Show More Authors

View Publication
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Biochemical & Cellular Archives,
BACTERIAL CONTAMINATION OF IRAQI BANKNOTES CURRENCY IN CIRCULATION IN BAGHDAD CITY
...Show More Authors

The present study was identified the type of bacterial contamination of Iraqi banknotes currency (Iraqi dinars) in circulation. 68 Iraqi banknotes currency of different denominations samples were randomly gathered from different locations and different occupational groups in Baghdad city. The results showed 61 (89.70%) of the samples were determined to be contaminated with bacteria, whereas 7 (10.29%) were confirmed to be sterile. A total of 11 different species of bacteria resulting in 72 isolates were found from those 61 contaminated Iraqi banknotes currency. Based on culture, morphological and biochemical tests, 11 isolates were identified as Bacillus sp., Staphylococcus aureus, Staphylococcus epidermidis, Corynebacterium diphtheria, Leu

... Show More
Publication Date
Tue Mar 01 2022
Journal Name
Journal Of Engineering
Scheme for Generating True Random Numbers using Electro-mechanical Switches
...Show More Authors

This paper proposes a novel method for generating True Random Numbers (TRNs) using electromechanical switches. The proposed generator is implemented using an FPGA board. The system utilizes the phenomenon of electromechanical switch bounce to produce a randomly fluctuated signal that is used to trigger a counter to generate a binary random number. Compared to other true random number generation methods, the proposed approach features a high degree of randomness using a simple circuit that can be easily built using off-the-shelf components. The proposed system is implemented using a commercial relay circuit connected to an FPGA board that is used to process and record the generated random sequences. Applying statistical testing on the exp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Retina Based Glowworm Swarm Optimization for Random Cryptographic Key Generation
...Show More Authors

The biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref