Urban wetlands are one of the complex systems that provide many economic, social and environmental services to the city. In this research, the most important services provided by urban wetlands from the point of view of the urban planner were reviewed, and the types of these lands and their divisions according to the type of services provided by each type were presented. Environmental is represented in its ability to reduce the dangers of floods, mitigate the climate and reduce its negative impacts, purify water and deplete a lot of suspended impurities and pollutants, and social services such as recreational areas and beautiful landscapes that inspire joy and reassurance in the soul, as well as cultural areas and sports activities for many sports Games, fishing fun, and economic services are home to many types of plants and animals, as well as the economic values of the services they provide as an infrastructure for many cities and provide a source of water sources for communities and sedimentation basins for sewage and sewage in addition to the economic values of tourism and recreational activities for those lands, as well as identifying needs For each type and the appropriate spatial distribution for each type according to the Special standards and the use of GIS technologies to be included in the master plan for cities in order to achieve the goals of sustainable development for these cities.
Racism is a serious issue that impacts a lot of people around the world. Since slavery days, racial discrimination has been increasing to abhorrent levels in relation to black people. The aim of individual psychology by Alfred Adler is to study human behaviour by situating it in the social context which makes his writing ideal to explanation of racism. This paper aims to study racism in Roy Williams’ Fallout from the perspective of Alfred Adler’s theory. Alfred Adler's individual psychology emphasizes the importance of social factors in shaping individual behavior, including the ways in which individuals form their sense of self and identity. This makes it a valuable framework for understanding the complex social and psychological facto
... Show MoreAging of asphalt pavements typically occurs through oxidation of the asphalt and evaporation of the lighter maltenes from the binder. The main objective of this study is to evaluate influence of aging on performance of asphalt paving materials.nAsphalt concrete mixtures, were prepared, and subjected to short term aging (STA) procedure which involved heating the loose mixtures in an oven for two aging period of (4 and 8) hours at a temperature of 135 o C. Then it was subject to Long term aging (LTA) procedure using (2 and 5) days aging periods at 85 o C for Marshall compacted specimens. The effect of aging periods on properties of asphalt concrete at optimum asphalt content such as Marshall Properties, indirect tensile strength at 25 o C,
... Show MoreIntroduction: Syphilis is a sexually transmitted disease, that may be transferred from mothers to infants during pregnancy if it is left untreated. Method: This study was conducted among 65 women who suffered from recurrent abortions in Iraq. Syphilis screening recombinant (IgM + IgG) level by ELISA, RADIM (Italy) and rapid plasma reagin (RPR) (positive and negative results) tests were used to analyse the data. Results: A non-significant association was observed with age (p=0.989), and the number of healthy births (p=0.643). Non-significant differences were observed in comparisons between smoker and non-smoker percentages in the study group. The rapid test for syphilis confirmation was applied using Rapid Plasma Reagin (RPR) tests.
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreIn this research, we present a nonparametric approach for the estimation of a copula density using different kernel density methods. Different functions were used: Gaussian, Gumbel, Clayton, and Frank copula, and through various simulation experiments we generated the standard bivariate normal distribution at samples sizes (50, 100, 250 and 500), in both high and low dependency. Different kernel methods were used to estimate the probability density function of the copula with marginal of this bivariate distribution: Mirror – Reflection (MR), Beta Kernel (BK) and transformation kernel (KD) method, then a comparison was carried out between the three methods with all the experiments using the integrated mean squared error. Furthermore, some
... Show MoreThe predisposing factors and their effect on the increasing of vulvovaginal Candidiasis have been studied in this research. The result indicated that the highest of infection with vaginal Candidias was in the age of women with age of (21-30years) with vaginal itching and discharge, also the results revealed that the pregnancy was the main predisposing factor. The percentage of the infected pregnant Ladies was 33.7% followed by the women who used the IUCD and OCP 22.1%, those who used steroids 5.2% comparing with control women (without predisposing factors).The results also indicated that the most cases of infection were during the third trimester of pregnancy (where the rate of infedion) was 53.9%.-OCP- Oral Contraceptive Pills-IUCD- Intrr
... Show More<span lang="EN-US">In the last years, the self-balancing platform has become one of the most common candidates to use in many applications such as flight, biomedical fields, and industry. In this paper, the physical prototype of a proposed self-balancing platform that described the self-balancing attitude in the (X-axis, Y-axis, or biaxial) under the influence of road disturbance has been introduced. In the physical prototype, the inertial measurement unit (IMU) sensor will sense the disturbance in (X-axis, Y-axis, and biaxial). With the determined error, the corresponding electronic circuit, DC servo motors, and the Arduino software, the platform overcame the tilt angle(disturbance). Optimization of the proportional-integral-
... Show MoreStudied red beetle life on each of the yen and wheat durum wheat, barley, corn, rice, chickpeas, ground peanuts and beans in Living situation constant temperature and relative humidity of 65% for a period of 66 days was the life cycle of the insect different from one substance to another ....
In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai
... Show MoreIn this paper, simulation studies and applications of the New Weibull-Inverse Lomax (NWIL) distribution were presented. In the simulation studies, different sample sizes ranging from 30, 50, 100, 200, 300, to 500 were considered. Also, 1,000 replications were considered for the experiment. NWIL is a fat tail distribution. Higher moments are not easily derived except with some approximations. However, the estimates have higher precisions with low variances. Finally, the usefulness of the NWIL distribution was illustrated by fitting two data sets