The objective of all planning research is to plan for human comfort and safety, and one of the most significant natural dangers to which humans are exposed is earthquake risk; therefore, earthquake risks must be anticipated, and with the advancement of global technology, it is possible to obtain information on earthquake hazards. GIS has been utilized extensively in the field of environmental assessment research due to its high potential, and GIS is a crucial application in seismic risk assessment. This paper examines the methodologies used in recent GIS-based seismic risk studies, their primary environmental impacts on urban areas, and the complexity of the relationship between the applied methodological approaches and the resulting environmental risk assessments. Using spatial analysis techniques based on the history of spatial earthquakes, fault lines, and residential complexes. This article provides map which depict the most significant seismic danger zones in Iran. The analysis reveals that the area of very dangerous and earthquake-prone zone is equal to (12%) from the residential areas, it is concentrated in the western region, adjacent to Iraq and close to the tectonic plate. The dangerous areas are concentrated in the western side of Iran, extending from the north to the south (20%), which is a fairly large percentage. As for the critical area by earthquake-prone, they are concentrated in the northern regions (23%), The medium critical areas are frequent in the centre and the north-east in Iran, and it is the largest area (26%), while the areas that less affected by the risk of an earthquake, are concentrated in the middle (17%), As for the areas that are not affected by the risk of earthquakes, (1%).
To develop a new basis to reduce the phenomenon of stress, one researcher used relaxation techniques is the use of medicinal herbs sedative which is emphasized by some specialists and researchers because of its direct impact on some of the functions of the body as members have a significant impact on the player from the mental and physical Came the importance of research in the use of medicinal herbs sedative and in particular (Lafracin Black, Plantago Sinani great, Alternen) within the program to soothe the psychological players badminton to get rid of the tension felt by sports by athletic competition through the use of a program to ease the psychological with a range of herbs and both means of calming influence of the nervous system. The
... Show Moreاستهدف البحث فصل بروتينات مصل دم كل من الحمامة الفاختة (Streptopelia decaocto) والحمامة المطوقة (Streptopelia senegalensis) بطريقة الترحيل الكهربائي كطريقة تصنيفية مابين النوعين . تم جمع 23 حمامة فاختة (13 ذكر و10 إناث) و 15 حمامة ضاحكة (8 ذكر و5 إناث) من مناطق مختلفة من مدينة بغداد ، وتم سحب0.1 مل من الدم من الوريد الموجود
Rate of penetration plays a vital role in field development process because the drilling operation is expensive and include the cost of equipment and materials used during the penetration of rock and efforts of the crew in order to complete the well without major problems. It’s important to finish the well as soon as possible to reduce the expenditures. So, knowing the rate of penetration in the area that is going to be drilled will help in speculation of the cost and that will lead to optimize drilling outgoings. In this research, an intelligent model was built using artificial intelligence to achieve this goal. The model was built using adaptive neuro fuzzy inference system to predict the rate of penetration in
... Show MoreThis paper describes a new proposed structure of the Proportional Integral Derivative (PID) controller based on modified Elman neural network for the DC-DC buck converter system which is used in battery operation of the portable devices. The Dolphin Echolocation Optimization (DEO) algorithm is considered as a perfect on-line tuning technique therefore, it was used for tuning and obtaining the parameters of the modified Elman neural-PID controller to avoid the local minimum problem during learning the proposed controller. Simulation results show that the best weight parameters of the proposed controller, which are taken from the DEO, lead to find the best action and unsaturated state that will stabilize the Buck converter system performan
... Show MoreThis research proposes the application of the dragonfly and fruit fly algorithms to enhance estimates generated by the Fama-MacBeth model and compares their performance in this context for the first time. To specifically improve the dragonfly algorithm's effectiveness, three parameter tuning approaches are investigated: manual parameter tuning (MPT), adaptive tuning by methodology (ATY), and a novel technique called adaptive tuning by performance (APT). Additionally, the study evaluates the estimation performance using kernel weighted regression (KWR) and explores how the dragonfly and fruit fly algorithms can be employed to enhance KWR. All methods are tested using data from the Iraq Stock Exchange, based on the Fama-French three-f
... Show MoreThe current study aims to identify soil pollutants from heavy metals The study utilized 40 topsoil (5 cm) samples, which adapted and divided into seven regions lies in Baghdad governorate, included (Al-Husainya,(Hs) Al-Doura (Do), Sharie Al-Matar (SM), Al-Waziria (Wz), Nharawan (Nh), Abu Ghraib (Abu) and Al-Mahmoodyia (Mh)). Spatial distribution maps of Nickel (Ni), Manganese (Mn), Lead (Pb) and Zinc (Zn) were created for Baghdad city using Geographic Information Systems (GIS). The concentrations of four heavy metals in the soil of different area of Baghdad were measured and observed using XRF instrument. The result found highest values of Pb and Zn at the middle of the Baghdad in (Wz
Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreProsthetic is an artificial tool that replaces a member of the human frame that is absent because of ailment, damage, or distortion. The current research activities in Iraq draw interest to the upper limb discipline because of the growth in the number of amputees. Thus, it becomes necessary to increase researches in this subject to help in reducing the struggling patients. This paper describes the design and development of a prosthesis for people able and wear them from persons who have amputation in the hands. This design is composed of a hand with five fingers moving by means of a gearbox ism mechanism. The design of this artificial hand has 5 degrees of freedom. This artificial hand works based on the principle of &n
... Show MoreGreen nanotechnology is a thrilling and rising place of technology and generation that bracesthe ideas of inexperienced chemistry with ability advantages for sustainability, protection, andthe general protection from the race human. The inexperienced chemistry method introduces aproper technique for the production, processing, and alertness of much less dangerous chemicalsubstances to lessen threats to human fitness and the environment. The technique calls for inintensity expertise of the uncooked materials, particularly in phrases in their creation intonanomaterials and the resultant bioactivities that pose very few dangerous outcomes for peopleand the environment. In the twenty-first century, nanotechnology has become a systematic
... Show More
