Research studies show that urban green spaces promote physical activity, the health of urban residents, and psychological well-being. Taking the community park in Duhok city as the research object, the spatial service area in terms of accessibility of to the Community Park under the mode of pedestrian transportation is analyzed by using the network analysis service area function of the geographic information system (GIS). The results show that under the walking mode in the research area, Parks are concentrated in the north and south of the city, but community parks are few in disadvantaged neighborhoods. In addition, there is a significant disparity between the number of community parks and the number of communities. Only 11 communities have walking access to a community park, whereas roughly 31 neighborhoods could not access. However, the network study results show that there is no pedestrian access to Azadi Park because it is positioned in the center of the roads. Finally, because of the community park's undesirable location, overall accessibility is poor, and space accessibility is low. The distribution of parks does not correspond to accessibility requirements. Furthermore, as the number of people increases, the present urban park green space cannot fulfill the demands of all urban residents. The findings of the study suggest that GIS network analysis might be used to improve the spatial design and layout of community parks in Duhok city to be more sustainable.
A prominent figure such as Yahya bin Khaldoun and a scholar of the moroccan countries in the medieval era, and had a special place in the history of the country and the state of Bani Zayan, and the positions he occupied in it and left his scientific, literary and historical traces, leaving him an imprint in the course of history and its events, and in this study
I dealt with the research: his personal life : his name and lineage, then his upbringing and his family.
The aim of the study is to know this character in the details of his personal and scientific life, according to the historical descriptive research method, including description and presentation of events, and linking them in a
... Show Moreتم في هذه الدراسة أعادة التخطيط لتوزيع الهيئات الرقابية على االدارات الخاضعة لتدقيقها لدائرة تدقيق نشاط التمويل والتوزيع في ديوان الرقـابة المالية االتحادي ، وتم بناء أنموذج التخصيص العـام اعتمادا"على لسنة أنجاز أعمال الهيئات الرقابية لالدارات الخاضعة (2016 (أوقـات,حيث أنـه تـم بنـاء أنموذج ريـاضي لتدقيقهاللمجموعة االولى لهيئات هـذه الدائرة وذلك للحصول علىالتخصيص األمثل للهيئات الـرقـابية على االدارات وي
... Show MoreAbstract: The M(II) complexes [M2(phen)2(L)(H2O)2Cl2] in (2:1:2 (M:L:phen) molar ratio, (where M(II) =Mn(II), Co(II), Cu(II), Ni(II) and Hg(II), phen = 1,10-phenanthroline; L = 2,2'-(1Z,1'Z)-(biphenyl-4,4'-diylbis(azan-1-yl-1-ylidene))bis(methan-1-yl-1- ylidene)diphenol] were synthesized. The mixed complexes have been prepared and characterized using 1H and13C NMR, UV/Visible, FTIR spectra methods and elemental microanalysis, as well as magnetic susceptibility and conductivity measurements. The metal complexes were tested in vitro against three types of pathogenic bacteria microorganisms: Staphylococcus aurous, Escherichia coli, Bacillussubtilis and Pseudomonasaeroginosa to assess their antimicrobial properties. From this study shows that a
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreIn information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show Moreفقد تناولت في موضوعي هذه الآية الكريمة فقد جاء في هذه الآية تعليم من الله عز وجل لرسوله (ص) فلكل داع الى الله من أمته, اسلوباٌ يدعوا به الناس ومحاجة الكافرين بالقرآن, وفيها بيان من الله عز وجل بأنه سيري الناس في المستقبل بعض آياته في كونه, وهي آيات دالات على أن القران حق منزل من عند الله جل جلاله, وليس من وضع البشر, فالناس عاجز عن معرفة الآيات الباهرات التي سيريها الله عز وجل للناس في كونه , وقد أخبرهم عنها في القرآ
... Show Moreءأرﻘﻟا ةﺎﯾﺣﺑ ًﺎﻘﯾﺛو ًﻻﺎﺻﺗا لﺻﺗﺗ. نﻣ ﮫﺑﺗﺎﮐﻟﻟ ﻲﺻﺧﺷﻟا ﻊﺑﺎطﻟا ﻲﻔﺣﺻﻟا دوﻣﻌﻟا لﻣﺣﯾ ا فﻟﺗﺧﻣﻟ ﮫﻟوﺎﻧﺗ لﻼﺧ وا ﮫﺋارا وا هرظﻧ ﺔﮭﺟو لﻣﺣﺗ ﻲﺗﻟا ﺔﯾﻣوﯾﻟا ثادﺣﻻاو ﺎﯾﺎﺿﻘﻟ ﺢﺿﻔﺑ موﻘﯾو ثادﺣﻻاو ﺔﯾﺑﻟﺳﻟا رھاوظﻟﻟ ىدﺻﺗﯾ وا، ءيرﺎﻘﻟا ﯽﻟا ﮫﺑرﺎﺟﺗ وا هرﺎﮐﻓا ءﺎطﺧﻻا دﺻرﯾ بﯾﻗرﺑ ﮫﺑﺷا وھو، ءيرﺟﻟا دﻘﻧﻟا نﻋ مﻧﯾ بوﻟﺳﺎﺑ ﺔﺋطﺎﺧﻟا تﺎﺳرﺎﻣﻣﻟا ﺎﮭﺣدﻣﯾو تﺎﯾﺑﺎﺟﯾﻻا ﯽﻟﻋ
... Show More