A Geographic Information System (GIS) is a computerized database management system for accumulating, storage, retrieval, analysis, and display spatial data. In general, GIS contains two broad categories of information, geo-referenced spatial data and attribute data. Geo-referenced spatial data define objects that have an orientation and relationship in two or three-dimensional space, while attribute data is qualitative data that can be counted for recording and analysis. The main aim of this research is to reveal the role of GIS technology in the enhancement of bridge maintenance management system components such as the output results, and make it more interpretable through dynamic colour coding and more sophisticated visualization techniques than the conventional tabular data format. To achieve the main objective of this research, two study areas have been chosen: the old constructionbridge (Al-Qadisiyah bridge) and the newly constructed bridge (Barboty bridge). Both of them are in Al-Muthanna city \ Iraq. The data collection process was achieved in two stages: the first stage is providing a georeferenced satellite image for each study area for the purpose of producing a two-dimensional map. The second stage includes the field surveying process by total station and level instruments. GIS have been used to create a comprehensive database (Geodatabase) for both study areas. Geostatistical analysis was carried out in which the settlement areas of both study areas were defined by producing a colour image. The statistical tables for these analyses showed that the highest decline in the elevation reached at Al-Qadisiyah bridge to 19 mm in the middle of the bridge which is coloured as a red areas. On the other hand, it was found that the highest decline in the elevation of the Barboty bridge is 16 mm in the last part of steel space which is also coloured as a red areas.
The research examines the extent to which government spending decisions can affect the level of the financial performance of the directorate. The research problem was based on the financial reality of the Directorate of Sewerage of Diyala province. Spending on the Directorate of the research area. To achieve a set of objectives: indicate the impact of government spending decisions on financial performance, the use of financial analysis to assess the performance of the Directorate. The research adopted financial analysis tools, a set of financial ratios, through which the spending decisions taken by the Directorate of the field of research will be evaluated, and during the period (2014-2018). The research also adopted statistical
... Show MoreThe research presents the "theory of happiness according to Junaid al-Baghdadi" and the theory's most significant characteristics.
The reasons for happiness, include knowledge, love, and providence, and happiness itself is the return of man or spirit to the source from which it originated.
Autorías: Nadeema Badr Mohammed, Missaa Nadem, Huda Badwe Shbeeb, Iqbal Abdul Hussein Neamah, Najlaa Abbas AL Zuhairi, Nihad Mohammed Alwan. Localización: Retos: nuevas tendencias en educación física, deporte y recreación. Nº. 63, 2025. Artículo de Revista en Dialnet.
Automatic Programming Assessment (APA) has been gaining lots of attention among researchers mainly to support automated grading and marking of students’ programming assignments or exercises systematically. APA is commonly identified as a method that can enhance accuracy, efficiency and consistency as well as providing instant feedback on students’ programming solutions. In achieving APA, test data generation process is very important so as to perform a dynamic testing on students’ assignment. In software testing field, many researches that focus on test data generation have demonstrated the successful of adoption of Meta-Heuristic Search Techniques (MHST) so as to enhance the procedure of deriving adequate test data for efficient t
... Show MoreObjective: The objective of this study is to develop instructional materials that teach fundamental basketball skills to female students enrolled in the first year of the College of Physical Education and Sports Sciences for Girls at the University of Baghdad while also encouraging reflective thinking (RT). Research methodology: the researcher chose the experimental methodology with the two equal group's method. Finding the community and choosing the right sample for the study's kind and goals are essential to the accomplishment of any research project. A sample for the primary experiment was picked at random after the researcher confirmed the students' first-year basketball curriculum. This study community consisted of (40) fourth-
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreImage fusion is one of the most important techniques in digital image processing, includes the development of software to make the integration of multiple sets of data for the same location; It is one of the new fields adopted in solve the problems of the digital image, and produce high-quality images contains on more information for the purposes of interpretation, classification, segmentation and compression, etc. In this research, there is a solution of problems faced by different digital images such as multi focus images through a simulation process using the camera to the work of the fuse of various digital images based on previously adopted fusion techniques such as arithmetic techniques (BT, CNT and MLT), statistical techniques (LMM,
... Show MoreRecently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show More