Preferred Language
Articles
/
joe-1220
Potentiality Analysis of Physical Development of International Airports Surrounding Zones
...Show More Authors

The areas surrounding Iraqi international airports generally suffer from a lack of interest in their planning in a manner compatible with the airport with the absence of integrated planning between the airport and the city. From here, the search problem appears. It is represented by a lack of interest in the integration of urban planning and airport planning and the lack of a clear policy to deal with the areas surrounding international airports. A desire to achieve the research aims to introduce compatible uses in the vicinity of airports and review the planning and global directions for dealing with the areas surrounding the airports within urban areas. In contrast, the second aspect of the research aims to assess the uses of the land surrounding the airports and determine their compatibility with the planning directions of these areas. The research studied the areas surrounding Baghdad International Airport and conducted a comprehensive survey of land uses within a distance of (4) km from the airport runway center. Then it conducted an analysis using geographical information systems(GIS) and studied the survey results, and assumed that the current uses of the areas surrounding international airports do not reflect the optimal use of these areas and, therefore, not exploiting the current capabilities and development opportunities provided by the airport for the surrounding areas. The research hypothesis is tested through the use of (GIS )and displaying the results of the field survey of land uses within the study area.

Furthermore, the methodology of comparative spatial analysis was done by monitoring the current situation through (GIS) and analyzing the result and comparing it with international standards to achieve results that contribute to attaining physical development. The first part of the research presents an introduction to international airports that are one of the most significant urban nodes in the city. The surrounding areas have many features that require regulation and coordination. The presence of incompatible uses in the vicinity of the airport leads to the loss of the advantages provided by the airport and the occurrence of adverse effects on the surrounding areas. Part two introduced compatible uses in the vicinity of airports. Part Three analyzed the case study of the areas surrounding Baghdad Airport. Then the results of the field survey showed that there are incompatible uses and the absence of compatible uses, and this case requires the identification of many planning procedures and benefiting from global trends in planning these areas.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Nov 02 2014
Journal Name
International Journal Of Engineering Research And General Science
Security in Cloud Computing
...Show More Authors

Becloud stupefy computing is solid buzzword in the trade. It is timeless in which the advantage seat be leveraged on sound out miserable take into consideration reducing the indict and complication of grant providers. Cloud computing promises to curtail truly and opinionated retrench and approximately specifically concede IT departments focusing on moral projects as contrasted with of misery datacenters contention, It is unconditionally with than on the up internet. Give are sundry consequences of this put together. For the actuality remodeling in turn flock cause get revenge buyer be attractive to. This implies ramble they chaperone custody of servers, they carry out software updates and assistant on the condense user pay

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 01 2009
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Lymphocyte subsets phenotype in patients with infectious mononucleosis
...Show More Authors

Background: Infectious mononucleosis (IM) is a lymphoproliferative disease caused primarily by the Epstein-Barr virus (EBV) infection. The initial viral infection by EBV occurs in B lymphocytes and is followed by an extensive proliferation of T lymphocytes. Previous studies on immunity to EBV (including IM) have mainly focused on activation of peripheral blood T cells, which are responsible for the lymphocytosis in blood during acute IM.
Patients and Methods: Indirect immunofluorescence technique analysis was performed to detect the percentage of CD3, CD4, CD8, CD19, and CD56 positive lymphocytes.
Results: Our results on the phenotype of T cells in samples from patients with infectious mononucleosis sh

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jan 03 2016
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Alcohol and drug abuse in post-conflict Iraq
...Show More Authors

Background: The 2006-2007 Iraqi Mental Health survey (IMHS) reported surprisingly low prevalence of alcohol and drug abuse in the Iraqi population. Since then anecdotal and clinical reports have suggested that abuse of alcohol and drugs in Iraq has increased. To investigate this possibility, we conducted a survey of drug and drug abuse at youth centers in Baghdad.
Objective: To investigate this possibility, we conducted a survey of drug and drug abuse at youth centers in Baghdad.
Patients and methods: A total of 2678 persons were included in this survey with male to female ratio of 3.8:1. They were randomly selected from youth centers located in different sectors in Baghdad (Sader city, Al-Rusafa side and Al-Karkh side). Composite

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Sep 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Combining a Hill Encryption Algorithm and LSB Technique With Dispersed Way for Securing Arabic and English Text Messages Hidden in Cover Image
...Show More Authors

         In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate      ( 75-86) that differentiates according to  length of message and image resolution.

View Publication Preview PDF
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
Building a Training Program on Developing Executive Functions for Kindergarten Children
...Show More Authors

Abstract
The research aims to build a training program to develop some executive functions for kindergarten children. To achieve this goal, the two researchers built the program according to the following steps:
1. Determining the general objective of the program.
2. Determining the behavioral objectives of the program.
3. Determining the included content in the program.
4. Implementing the content of the activities of the program.
5. Evaluating the Program.
The program included (12) training activities, the training activities included several items: the title of the activity, the time of implementation of the activity, the general objective of the activity, the procedural behavioral objective, the means and tools u

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 31 2023
Journal Name
College Of Islamic Sciences
Heretic rulings And related words in Islamic jurisprudence
...Show More Authors

How I was eager to research the ruling on three of the most dangerous types to Islam and Muslims (the heretic, the sorcerer, the innovator, and related terms).
Because it is the most dangerous deadly disease that destroys the hearts of Muslims, and may even expel a Muslim from the circle of Islam, and how many Muslims have done or committed such a thing without knowing it. Indeed, how many Muslims have left Islam and whose wife has abandoned him without realizing it, and among them are those who have committed it without knowing it. As well as related words associated with heresy.( )
Because people debated such matters between extremists and lenient ones, most of whom were extremists, and they did not reach a conclusion. So I decid

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
College Of Islamic Sciences
Divine orders Divine orders directed to his prophets (peace be upon them): Divine orders directed to his prophets (peace be upon them)
...Show More Authors

 

ملخص البحث:

    ان الله تعالى هو الذي خلق جميع المخلوقات ، والذي بيده الموت والحياة وان كل هذه المخلوقات تحتاج الى اوامر ، وهذه الاوامر الالهية وجهها الله لعبادة بوساطة انبياءه ( عليهم السلام) فكانوا هم اول المستسلمين والمنقادين لأوامره ، فجاءت الآيات الكريمة مخاطبة للأنبياء واقوامهم بشكل عام ولنبينا محمد (r) بشكل خاص.

اما عن المضمون البحثي فقد جاءت مادته مقسمة الى ثل

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
International Conference Of Computational Methods In Sciences And Engineering Iccmse 2021
Fibrewise totally topological spaces
...Show More Authors

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
College Of Islamic Sciences
Need and transgression in Surat (Abs) Semantic grammatical study: Need and transgression in Surat (Abs)
...Show More Authors

      The research aims to highlight the significance and composition and the diversity of meanings and the Quranic context in the necessary and transgressive verbs in Surat (Abs).

      This research consists of : a preamble , and two studies . The researcher addressed in the preliminary the importance of the phenomenon of necessity and infringement, the signs of the necessary action , the structure and controls of the act , the methods of infringement , its sections and signs.

      As for the first topic : The researcher addressed the necessary verbs in Surat Abs , an applied study in terms of grammati

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 10 2016
Journal Name
Iraqi Journal Of Science
Satellite image classification using KL-transformation and modified vector quantization
...Show More Authors

In this work, satellite images classification for Al Chabaish marshes and the area surrounding district in (Dhi Qar) province for years 1990,2000 and 2015 using two software programming (MATLAB 7.11 and ERDAS imagine 2014) is presented. Proposed supervised classification method (Modified Vector Quantization) using MATLAB software and supervised classification method (Maximum likelihood Classifier) using ERDAS imagine have been used, in order to get most accurate results and compare these methods. The changes that taken place in year 2000 comparing with 1990 and in year 2015 comparing with 2000 are calculated. The results from classification indicated that water and vegetation are decreased, while barren land, alluvial soil and shallow water

... Show More