The research paper deals with the role of the place making in eco-tourism through a review of international experiences in the eco-tourism industry and its contribution to advancing the reality of tourism there, and attracting the largest number of tourists. The study is divided into five axes: the first is a study of related concepts, and the second is a study of global experiences, which included three countries: (South Bank (Gabriel's Wharf) - London, Rotterdam in the Netherlands, and dealt with each of Happy Streets and Kendrick Mills, and then the Perak River tourist corridor - Malaysia). As for the third axis, it is concerned with analyzing these experiences to reach the fourth axis, which is related to the practical framework and the field study of the city of Hit and the most important ingredients and capabilities it possesses for environmental tourism attraction, and then analyzing the region to know the types of ecotourism available and that may be available in it, as well as the capabilities and determinants that hinder its availability, as well as Clarifying the types of place making that can be applied in the city of Heat and clarifying some examples of them to advance the environmental tourism situation in it, using the method of making the tourist place. Finally, the fifth axis is related to the conclusions and recommendations that can be taken toadvance the environmental tourism reality of tourist destinations. Place Making Ecotourism Gabriel Wharf Rotterdam Heet Perak River Heet Waterwheels.
The researches to discover useful ways to represent the agents and agent-based
systems are continuous. Unified Modeling Language (UML) is a visual modeling language
used for software and non software modeling systems. The aim of this paper is: using UML
class diagram to design treasury pharmaceuticals agent and explain its internal action. The
diagram explains the movement of the agent among other nodes to achieve user's requests
(external) after it takes them. The paper shows that it is easy to model the practical systems by
using agent UML when they are used in a complex environment.
Many image processing and machine learning applications require sufficient image feature selection and representation. This can be achieved by imitating human ability to process visual information. One such ability is that human eyes are much more sensitive to changes in the intensity (luminance) than the color information. In this paper, we present how to exploit luminance information, organized in a pyramid structure, to transfer properties between two images. Two applications are presented to demonstrate the results of using luminance channel in the similarity metric of two images. These are image generation; where a target image is to be generated from a source one, and image colorization; where color information is to be browsed from o
... Show MoreIn this research, the results of x-ray diffraction method were used to determine the uniform stress deformation and microstructure parameters of CuO nanoparticles to determine the lattice strain obtained and crystallite size and then to compare the results obtained by two model Halder Wagner and Size Strain Plot with the results of these methods of the same powder using equations during which the calculation of the size of the crystallite size and lattice strain, It was found that the results obtained the values of the crystallite size (19.81nm) and the lattice strain (0.004065) of the Halder-wagner model respectively and for the ssp method were the results of the crystallite size (17.20nm) and lattice strain (0.000305) respectively. The sa
... Show MoreA new proposed technique for secure agent communication is used to transfer data and instructions between agent and server in the local wireless network. The proposed technique depends on the two stages of encryption processing (AES algorithm and proposed Lagrange encryption key generation supported by XOR gate) for packets encryption. The AES key was manipulated by using proposed Lagrange interpolation key generated in order to avoid the weak encryption keys. A good multi encryption operation with a fast encryption time was proposed with a high quality connection operation.
In this research the specifications of Iraqi drinking bottled water brands are investigated throughout the comparison between local brands, Saudi Arabia and the World Health Organization (WHO) for bottled water standard specifications. These specifications were also compared to that of Iraqi Tap Water standards. To reveal variations in the specifications for Iraqi bottled water, and above mentioned standards some quality control tools are conducted for more than 33% of different bottled water brands (of different origins such as spring, purified,..etc) in Iraq by investigating the selected quality parameters registered on their marketing labels. Results employing Minitab software (ver. 16) to generate X bar,
... Show MoreDuring more than (50) years past, India has achieved considerable social and economic progress. It is also generally assumed that the future progress will be even more rapid and that India will be an important player in the global market. India has only (2.5) percent of global land whereas it has to provide home for one-sixth of world's population .On examining the past trends of India's population ,it may be observed that during the latter half of the twentieth century ,about (650) million populations were added to the country ,thus living in a country with a high population density and high growth rate , India in need a transition from high fertility high mortality to a low fertility low mortality and towards stable population situatio
... Show MoreTo make iron oxide nanoparticles (IONPs), a simple chemical approach was used to combine iron chloride (FeCl2+FeCl3) salt with onion peel extract. According to the study, iron salts can be converted into IONPs by the biomolecules in onion peel extract. From FeCl2+FeCl3 to γ -Fe2O3, the approach changes iron oxide NPs' size, shape, purity and phases. In water treatment, γ -Fe2O3 NPs are critical for the removal of the color methylene blue (MB). X-ray diffraction (XRD), scanning electron microscopy (SEM), ultraviolet (UV-Vis) and photoluminescence (PL) spectroscopy were used to identify IONPs. Results from the XRD experiment showed crystals having a
... Show MoreTI1e Web service securi ty challenge is to understand and assess the risk involved in securing a web-based service today, based on our existing security technology, and at the same time tmck emerging standards and understand how they will be used to offset the risk in
new web services. Any security model must i llustrate how data can
now through an application and network topology to meet the
requirements defined by the busi ness wi thout exposing the data to undue risk. In this paper we propose &n
... Show MoreThe method of operational matrices based on different types of polynomials such as Bernstein, shifted Legendre and Bernoulli polynomials will be presented and implemented to solve the nonlinear Blasius equations approximately. The nonlinear differential equation will be converted into a system of nonlinear algebraic equations that can be solved using Mathematica®12. The efficiency of these methods has been studied by calculating the maximum error remainder ( ), and it was found that their efficiency increases as the polynomial degree (n) increases, since the errors decrease. Moreover, the approximate solutions obtained by the proposed methods are compared with the solution of the 4th order Runge-Kutta meth
... Show MoreWith the fast progress of information technology and the computer networks, it becomes very easy to reproduce and share the geospatial data due to its digital styles. Therefore, the usage of geospatial data suffers from various problems such as data authentication, ownership proffering, and illegal copying ,etc. These problems can represent the big challenge to future uses of the geospatial data. This paper introduces a new watermarking scheme to ensure the copyright protection of the digital vector map. The main idea of proposed scheme is based on transforming the digital map to frequently domain using the Singular Value Decomposition (SVD) in order to determine suitable areas to insert the watermark data.
... Show More