A Geographic Information System (GIS) is a computerized database management system for accumulating, storage, retrieval, analysis, and display spatial data. In general, GIS contains two broad categories of information, geo-referenced spatial data and attribute data. Geo-referenced spatial data define objects that have an orientation and relationship in two or three-dimensional space, while attribute data is qualitative data that can be counted for recording and analysis. The main aim of this research is to reveal the role of GIS technology in the enhancement of bridge maintenance management system components such as the output results, and make it more interpretable through dynamic colour coding and more sophisticated visualization techniques than the conventional tabular data format. To achieve the main objective of this research, two study areas have been chosen: the old constructionbridge (Al-Qadisiyah bridge) and the newly constructed bridge (Barboty bridge). Both of them are in Al-Muthanna city \ Iraq. The data collection process was achieved in two stages: the first stage is providing a georeferenced satellite image for each study area for the purpose of producing a two-dimensional map. The second stage includes the field surveying process by total station and level instruments. GIS have been used to create a comprehensive database (Geodatabase) for both study areas. Geostatistical analysis was carried out in which the settlement areas of both study areas were defined by producing a colour image. The statistical tables for these analyses showed that the highest decline in the elevation reached at Al-Qadisiyah bridge to 19 mm in the middle of the bridge which is coloured as a red areas. On the other hand, it was found that the highest decline in the elevation of the Barboty bridge is 16 mm in the last part of steel space which is also coloured as a red areas.
The research aims at shedding light on the impact of information technology in reducing tax evasion in the General Authority for Taxation. In order to achieve this, the research relied on the analysis of its variables as a main tool for collecting data and information. The results showed that there is a positive and positive effect of information technology on tax evasion. The impact of information technology on increasing tax revenues and reducing the phenomenon of tax evasion In the performance of the research sample, the research sought to highlight the importance of tax information technology through its data and information to the tax administration for the purpose of completing the process Taxpayers for persons subject to income ta
... Show MoreHusain as a king of Iraq.
This paper deals with the British communication with faisel . then Winston Churchill's speech in British common house .then fodlowed by arriving faisal to Iraq after that the referend um faisel .
The his claims of British maneuver lastly coronation on faisal & his inauguration as a king of Iraq.
There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreThe purpose of the study is to identify the teaching techniques that mathematics' teachers use due to the Brain-based learning theory. The sample is composed of (90) teacher: (50) male, (40) female. The results have shown no significant differences between male and female responses' mean. Additionally, through the observation of author, he found a lack of using Brain-based learning techniques. Thus, the researcher recommend that it is necessary to involve teachers in remedial courses to enhance their ability to create a classroom that raise up brain-based learning skills.
Atmospheric transmission is disturbed by scintillation, where scintillation caused more beam divergence. In this work target image spot radius was calculated in presence of atmospheric scintillation. The calculation depend on few relevant equation based on atmospheric parameter (for Middle East), tracking range, expansion ratio of applied beam expander's, receiving unit lens F-number, and the laser wavelength besides photodetector parameter. At maximum target range Rmax =20 km, target image radius is at its maximum Rs=0.4 mm. As the range decreases spot radius decreases too, until the range reaches limit (4 km) at which target image spot radius at its minimum value (0.22 mm). Then as the range decreases, spot radius increases due to geom
... Show MoreIn this study, a mathematical model is presented to study the chemisorption of two interacting atoms on solid surface in the presence of laser field. Our mathematical model is based on the occupation numbers formula that depends on the laser field which we derived according to Anderson model for single atom adsorbed on solid surface. Occupation numbers formula and chemisorption energy formula are derived for two interacting atoms (as a diatomic molecule) as they approach to the surface taking into account the correlation effects on each atom and between atoms. This model is characterized by obvious dependence of all relations on the system variables and the laser field characteristics which gives precise description for the molecule –
... Show More