In this study the role of remote sensing and geographic information systems in the planning of some Iraqi cities, including the city of Aziziyah in Kut / Wasit Governorate, was considered. Certain appropriate models (sprawling growth patterns) have been adopted to plan this city, and tables and a future map have been prepared to arrange this city. Land uses for public services will be proposed for adopted case(Aziziyah in Kut / Wasit Governorate). This paper describes a specific application of GIS functionalities for spatial planning analysis, examines the breadth of GIS and attempts to address the analytical part’s limitations in planning studies. The study concluded, through high-resolution visuals, to the possibility of determining the percentage of existing construction on its area and then observing the change in it, and observing the trend of urban growth and urban land uses in 2010, on the contrary, in 2022 due to the increase in population and then the increase in residential land uses. It goes on to explain the accuracy, accessibility, and visibility dimensions using the city of AL Aziziyah as an example.
Teen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC
... Show MoreThe reaction oisolated and characterized by elemental analysis (C,H,N) , 1H-NMR, mass spectra and Fourier transform (Ft-IR). The reaction of the (L-AZD) with: [VO(II), Cr(III), Mn(II), Co(II), Ni(II), Cu(II), Zn(II), Cd(II) and Hg(II)], has been investigated and was isolated as tri nuclear cluster and characterized by: Ft-IR, U. v- Visible, electrical conductivity, magnetic susceptibilities at 25 Co, atomic absorption and molar ratio. Spectroscopic evidence showed that the binding of metal ions were through azide and carbonyl moieties resulting in a six- coordinating metal ions in [Cr (III), Mn (II), Co (II) and Ni (II)]. The Vo (II), Cu (II), Zn (II), Cd (II) and Hg (II) were coordinated through azide group only forming square pyramidal
... Show MoreOur aim in this work is to investigate prime submodules and prove some properties of them. We study the relations between prime submodules of a given module and the extension of prime submodules. The relations between prime submodules of two given modules and the prime submodules in the direct product of their quotient module are studied and investigated.
ٳن العلاقة بين التخطيط والتنمية، تكتسب᾽ شكلها وطبيعتها من خلال دور التخطيط في ٳخضاع عملية التغيير والتحوّل للأوضاع الاقتصادية من وضع الى وضع آخر أكثر تقدما̋ عن طريق ٳعتماد منهج التخطيط لتحديد معالم خطوط السير المجدول زمنيا̋ لعملية التغيير والتحوّل وفقا̋ لرؤية الحكومة وفلسفتها باتجاه الانتقال من وضع ٳقتصادي وٳجتماعي متخلف الى وضع ٳقتصادي وٳجتماعي آخر يسمح بجعل عملية النمو مستمرة، ويمكن تبيّن تلك
... Show MoreThis paper interest to estimation the unknown parameters for generalized Rayleigh distribution model based on censored samples of singly type one . In this paper the probability density function for generalized Rayleigh is defined with its properties . The maximum likelihood estimator method is used to derive the point estimation for all unknown parameters based on iterative method , as Newton – Raphson method , then derive confidence interval estimation which based on Fisher information matrix . Finally , testing whether the current model ( GRD ) fits to a set of real data , then compute the survival function and hazard function for this real data.
The Costing Accounting is one the analytic tools which plays important role by support the management in planning& control and decisions-making ,as it became attendant necessity to establish any project whether industrial ,commercial ,service or agriculture ..etc.
The consolidated accounting system has committed the companies to have their active costing system in which the management can obtain their own data, but we found most of the economic units face problems of applying the costing system because of reasons related to the system design itself or might be related to the requirements of the application success.
... Show MoreSteganography involves concealing information by embedding data within cover media and it can be categorized into two main domains: spatial and frequency. This paper presents two distinct methods. The first is operating in the spatial domain which utilizes the least significant bits (LSBs) to conceal a secret message. The second method is the functioning in the frequency domain which hides the secret message within the LSBs of the middle-frequency band of the discrete cosine transform (DCT) coefficients. These methods enhance obfuscation by utilizing two layers of randomness: random pixel embedding and random bit embedding within each pixel. Unlike other available methods that embed data in sequential order with a fixed amount.
... Show MoreThe three parameters distribution called modified weibull distribution (MWD) was introduced first by Sarhan and Zaindin (2009)[1]. In theis paper, we deal with interval estimation to estimate the parameters of modified weibull distribution based on singly type one censored data, using Maximum likelihood method and fisher information to obtain the estimates of the parameters for modified weibull distribution, after that applying this technique to asset of real data which taken for Leukemia disease in the hospital of central child teaching .
The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra
... Show More