Preferred Language
Articles
/
jpd-396
Using GIS to identify hazardous earthquake locations in Iran
...Show More Authors

The objective of all planning research is to plan for human comfort and safety, and one of the most significant natural dangers to which humans are exposed is earthquake risk; therefore, earthquake risks must be anticipated, and with the advancement of global technology, it is possible to obtain information on earthquake hazards. GIS has been utilized extensively in the field of environmental assessment research due to its high potential, and GIS is a crucial application in seismic risk assessment. This paper examines the methodologies used in recent GIS-based seismic risk studies, their primary environmental impacts on urban areas, and the complexity of the relationship between the applied methodological approaches and the resulting environmental risk assessments. Using spatial analysis techniques based on the history of spatial earthquakes, fault lines, and residential complexes. This article provides map which depict the most significant seismic danger zones in Iran. The analysis reveals that the area of very dangerous and earthquake-prone zone is equal to (12%) from the residential areas, it is concentrated in the western region, adjacent to Iraq and close to the tectonic plate. The dangerous areas are concentrated in the western side of Iran, extending from the north to the south (20%), which is a fairly large percentage. As for the critical area by earthquake-prone, they are concentrated in the northern regions (23%), The  medium critical areas are frequent in the centre and the north-east  in Iran, and it is the largest area (26%),  while the areas that less affected by the risk of an earthquake, are concentrated in the middle (17%), As for the areas that are not affected by the risk of earthquakes, (1%).

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 28 2024
Journal Name
Journal Of International Dental And Medical Research
Effect of Air–Particle Abrasion of Dentin Surface on Shear Bond Strength of Lithium Disilicate to Dentin Using Three Different Cements
...Show More Authors

This study aims to evaluate the influence of the air abrasion of dentin on the shear bond strength of lithium disilicate using three different types of luting cements. Sixty cylindrical specimens were milled from lithium disilicate CAD/CAM blocks (IPSe.max CAD). Sixty sound human maxillary premolar teeth were decoronated to the level of peripheral dentin, then randomly divided into three groups according to the type of luting cement used for the cementation of the lithium disilicate specimens (n = 20); Group A: Glass ionomer cement (Riva Self- Cure); Group B: Adhesive resin cement (Rely X Ultimate); Group C: Self-adhesive resin cement (Rely X U200). Each group was then further subdivided into two subgroups (n=10); Subgroups AI, BI, and CI,

... Show More
Preview PDF
Scopus
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Design and Implementation of a Generalized N-Digit Binary-To-Decimal Converter on an FPGA Seven-Segment Display Using Verilog Hdl
...Show More Authors

It is often needed to have circuits that can display the decimal representation of a binary number and specifically in this paper on a 7-segment display. In this paper a circuit that can display the decimal equivalent of an n-bit binary number is designed and it’s behavior is described using Verilog Hardware Descriptive Language (HDL).
This HDL program is then used to configure an FPGA to implement the designed circuit.

View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Organizational Tactics An Approach to Strategic Agility A field study in a sample of mobile operators in Iraq
...Show More Authors

The current research dealt with the issue of organizational skillfulness as an entry point to reach strategic agility. The study has been tested in Iraq's mobile operators - Asia Cell, Zain Iraq and Cork Telecom. The study was applied to a sample of (93) managers distributed at various levels of management (board members, general managers, commissioners, department managers, people managers, unit managers, office managers). The survey used the questionnaire as a key tool for collecting data and information as well as personal interviews. It has sought to test a number of hypotheses related to correlation and influence relationships between the variables of the study, in order to answer the questions related to the problem of stud

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Nov 10 2017
Journal Name
Al–bahith Al–a'alami
Qualitative Research in Public Relations An Analytical: Study of Public Relations› Researches in Iraq from 1989 to 2016
...Show More Authors

In the mist of developments in the course of scientific research in general and humanities in particular and the accompanying changes in the visions and policies inspired by the need for these sciences to follow the qualitative methods in dealing with many of the topics or problems that require for their solution to obtain qualitative information which can be provided by resorting to quantitative research. Therefore, a new trend has emerged in many public relations› researchers who believe that qualitative research methods should be used by establishing scientific foundations and methodological classification based on the use of these methods and determining the nature of the subjects applied in them to reach results that are character

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Eyewitnesses’ Visual Recollection in Suspect Identification by using Facial Appearance Model
...Show More Authors

Facial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Tue Nov 18 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Enamel defect of primary and permanent teeth in relation to nutrients daily intake among Down's syndrome children in comparison to normal children
...Show More Authors

Background: Any child with Down's syndrome does not develop in the same manner as normal child. Therefore, the child should not be viewed as being like everyone else. Developmental enamel defects in primary teeth have been found at least twice as frequently in disabled children as in control children. Down's syndrome consumed protein more than the recommended daily allowance compared to other disabled groups. Therefore, the aim of this study was to investigate developmental defects of enamel and their relations to nutrient intake among Down's syndrome children in comparison to normal children. Materials and Methods: A sample consisted of fifty institutionalized Down's syndrome children (study group) and 50 normal children (control group)

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 31 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
THE PROBLEM OF RANDOMSLAUGHTER IN BAGHDAD AND THE POSSIBILITY OF APPLYING MOBILE SLAGHTERHOUSEES TO REDUCE THEM: THE PROBLEM OF RANDOMSLAUGHTER IN BAGHDAD AND THE POSSIBILITY OF APPLYING MOBILE SLAGHTERHOUSEES TO REDUCE THEM
...Show More Authors

One of the most important elements of achieving food security is livestock, which is an essential element in the agricultural sector, and is one of the state support sectors. Animal production (sheep) ranked an important position in this sector due to the economic advantages that are available when rearing. Moreover, the success and development of sheep breeding depend on several factors, including financial return and achieving profitability. The study aims to identify the phenomenon size of random slaughter as a problem, which spread in Baghdad and its causes and the factors that influencing its development. As well as, the possibility of applying the idea of a​​mobile slaughterhouse to reduce this phenomen

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Steganography in Audio Using Wavelet and DES
...Show More Authors

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Text hiding in text using invisible character
...Show More Authors

Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun Nov 27 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The extent to which the Iraqi environment responds to the requirements of IAS 12 in determining income tax: بحث تطبيقي في الهيئة العامة للضرائب/ قسم الشركات
...Show More Authors

The importance of this research comes from the possibility of achieving positive interaction between accounting and tax through the interest in setting accounting standards and adapting them to local tax legislation, as the adoption of the application of the international standard (IAS 12) for income taxes helps to measure and determine the base for income tax and may lead to an increase in the tax outcome. Through the reliance of enterprises on many accounting bases, and that the tax administration in Iraq depends on the element of personal judgment in determining the tax base, which leads to lack of objectivity in determining the tax outcome, as the impact of the accounting standard (IAS 12) on the tax base and tax outcome is one of th

... Show More
View Publication Preview PDF