Morphological theories shape the leading platform to theoretically and practically consider the assets connected with the emergence of the city, and its growth and development over time. In this paper, five elements of the urban form are typified: structure/tissue, plot, building, block, and the street pattern will be addressed. Understanding the urban form at the different levels within its ingredients could lead to shape a base launch of how to consider the potentiality of the development and sustainability of a particular area.
This paper aims at presenting a comparison between objective and subjective tests . This paper attemptsto shed light on these two aspects of tests and make do a compression by using suitable techniques for objective and subjective tests .
The paper compares between the two techniques used by the objective and subjective tests respectively, the time and efforts required by each type, the extent to which each type can be reliable, and the skills each type is suitable to measure.
The paper shows that objective tests, on the contrary of the subjective ones, encourages guess> Objective tests are used to test specific areas of langua
... Show MoreMany image processing and machine learning applications require sufficient image feature selection and representation. This can be achieved by imitating human ability to process visual information. One such ability is that human eyes are much more sensitive to changes in the intensity (luminance) than the color information. In this paper, we present how to exploit luminance information, organized in a pyramid structure, to transfer properties between two images. Two applications are presented to demonstrate the results of using luminance channel in the similarity metric of two images. These are image generation; where a target image is to be generated from a source one, and image colorization; where color information is to be browsed from o
... Show MoreWorldwide attention is being focused on nanocrystalline zeolites and they are replacing conventional ones due to their pronounced potential in many fields. In this study, NaY zeolite has been prepared hydrothermally using sol –gel method and modified to the proton type by ion –exchange process. Characterization is made using X-ray diffraction (XRD), thermogravimetric analysis (TGA), Fourier transform infrared spectroscopy (FTIR), Atomic force microscopy (AFM), Brunauer –Emmet- Teller (BET) nitrogen adsorption method, Ammonia Temperature programmed desorption (NH3-TPD) and Scanning electron microscopy( SEM). The effect of aging time, silica to alumina ratio is studied and the results sh
... Show MoreIn this study, a review of variety of processes that are used in the treatment produced water prior to reuse or to responsible disposal are presented with their environmental issues and economical benefits. Samples of produced water from five locations in Rumaila oilfield/in south of Iraq were taken and analyzed for their contents of brine, some heavy metals, total suspended solids and oil and grease. Moreover, two samples of water were treated using reverse osmosis technique which showed its ability to treat such contaminated water. The results showed that the environmental impact of produced water arises from its chemical composition; i.e., its salt content, its heavy metals, and hydrocarbon contents.
Community participation is one of the basic pillars of the sustainable development process. It provides opportunities for different groups of society to contribute to the management, preparation and implementation of development plans commensurate with their needs and aspirations. In this context, the study presents a study of the concept of community participation and its importance in sustainable development, In terms of its conditions, requirements and principles, as well as its image, as well as addressing the most important challenges and obstacles facing the participation of citizens in development projects. The research also provides an analysis of a number of international and Arab experiences adopted In its polici
... Show MoreIn this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreAbstract
The Research "Surah At-Talaq between Commentators and Jurists" is summarized in the objectives of the Surah, clarifying the meanings of the verses of the rulings contained therein by mentioning the statements of the commentators, with mentioning the most acceptable of those meanings when a difference arises, explanation of the provisions of the Surah, with a statement of sayings of the four religious schools of Islamic jurisprudence, in summary, due to the narrowness of the place, and the most acceptable of them.
The research addresses (9) topics, which are: the objectives of Surah At-Talaq, prohibition of divorce during menstruation, testifying retract and divorce, irrevocably divo
... Show MoreVariable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with
minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required informatio