Preferred Language
Articles
/
joe-967
Urban Form Elements and Urban Potentiality ( Literature Review)
...Show More Authors

Morphological theories shape the leading platform to theoretically and practically consider the assets connected with the emergence of the city, and its growth and development over time. In this paper, five elements of the urban form are typified: structure/tissue, plot, building, block, and the street pattern will be addressed. Understanding the urban form at the different levels within its ingredients could lead to shape a base launch of how to consider the potentiality of the development and sustainability of a particular area.   

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2014
Journal Name
Journal Of The College Of Languages (jcl)
A comparison between Objective and subjective tests
...Show More Authors

This paper aims at presenting a comparison between objective and subjective tests . This paper attemptsto shed light on these two aspects of tests and make do a compression by using suitable techniques for objective and subjective tests .

     The paper compares between the two techniques used by the objective and subjective tests respectively, the time and efforts required by each type, the extent to which each type can be reliable, and the skills each type is suitable to measure.

     The paper shows that objective tests, on the contrary of the subjective ones, encourages guess> Objective tests are used to test specific areas of langua

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Luminance pyramid for image generation and colorization
...Show More Authors

Many image processing and machine learning applications require sufficient image feature selection and representation. This can be achieved by imitating human ability to process visual information. One such ability is that human eyes are much more sensitive to changes in the intensity (luminance) than the color information. In this paper, we present how to exploit luminance information, organized in a pyramid structure, to transfer properties between two images. Two applications are presented to demonstrate the results of using luminance channel in the similarity metric of two images. These are image generation; where a target image is to be generated from a source one, and image colorization; where color information is to be browsed from o

... Show More
Scopus (2)
Scopus
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Synthesis and Characterization of Nanocrystalline Zeolite Y
...Show More Authors

Worldwide attention is being focused on  nanocrystalline  zeolites  and they are replacing conventional ones due to their pronounced potential in many fields. In this study, NaY zeolite has been prepared hydrothermally using sol –gel method and modified to the proton type by ion –exchange process. Characterization is made using X-ray diffraction (XRD), thermogravimetric analysis (TGA),  Fourier transform infrared spectroscopy (FTIR),  Atomic force microscopy (AFM), Brunauer –Emmet- Teller (BET) nitrogen adsorption method, Ammonia Temperature programmed desorption (NH3-TPD) and Scanning electron microscopy( SEM).  The effect of aging time, silica to alumina ratio is studied and the results sh

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 17 2015
Journal Name
Monthly Notices Of The Royal Astronomical Society
Line and continuum variability in active galaxies
...Show More Authors

View Publication
Scopus (12)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Mon Mar 01 2010
Journal Name
Al-khwarizmi Engineering Journal
Components and Treatments of Oilfield Produced Water
...Show More Authors

In this study, a review of variety of processes that are used in the treatment produced water prior to reuse or to responsible disposal are presented with their environmental issues and economical benefits. Samples of produced water from five locations in Rumaila oilfield/in south of Iraq were taken and analyzed for their contents of brine, some heavy metals, total suspended solids and oil and grease. Moreover, two samples of water were treated using reverse osmosis technique which showed its ability to treat such contaminated water. The results showed that the environmental impact of produced water arises from its chemical composition; i.e., its salt content, its heavy metals, and hydrocarbon contents.

View Publication Preview PDF
Publication Date
Sat Oct 12 2019
Journal Name
Journal Of The College Of Education For Women
Participatory Planning and Sustainable Development of Society
...Show More Authors

 

Community participation is one of the basic pillars of the sustainable development process. It provides opportunities for different groups of society to contribute to the management, preparation and implementation of development plans commensurate with their needs and aspirations. In this context, the study presents a study of the concept of community participation and its importance in sustainable development, In terms of its conditions, requirements and principles, as well as its image, as well as addressing the most important challenges and obstacles facing the participation of citizens in development projects. The research also provides an analysis of a number of international and Arab experiences adopted In its polici

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Steganography in Audio Using Wavelet and DES
...Show More Authors

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Middle East African Journal Of Ophthalmology
Obstacles and challenges facing Iraqi women ophthalmologists
...Show More Authors

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Jan 10 2023
Journal Name
College Of Islamic Sciences
Surah At-Talaq Between Commentators and Jurists
...Show More Authors

Abstract

The Research "Surah At-Talaq between Commentators and Jurists" is summarized in the objectives of the Surah, clarifying the meanings of the verses of the rulings contained therein by mentioning the statements of the commentators, with mentioning the most acceptable of those meanings when a difference arises, explanation of the provisions of the Surah, with a statement of sayings of the  four religious schools of Islamic jurisprudence, in summary, due to the narrowness of the place, and the most acceptable of them.

The research addresses (9) topics, which are: the objectives of Surah At-Talaq, prohibition of divorce during menstruation, testifying retract and divorce, irrevocably divo

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Design and Implementation of a Vlsm Simulator
...Show More Authors

Variable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with
minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required informatio

... Show More
View Publication Preview PDF
Crossref