Preferred Language
Articles
/
joe-1220
Potentiality Analysis of Physical Development of International Airports Surrounding Zones
...Show More Authors

The areas surrounding Iraqi international airports generally suffer from a lack of interest in their planning in a manner compatible with the airport with the absence of integrated planning between the airport and the city. From here, the search problem appears. It is represented by a lack of interest in the integration of urban planning and airport planning and the lack of a clear policy to deal with the areas surrounding international airports. A desire to achieve the research aims to introduce compatible uses in the vicinity of airports and review the planning and global directions for dealing with the areas surrounding the airports within urban areas. In contrast, the second aspect of the research aims to assess the uses of the land surrounding the airports and determine their compatibility with the planning directions of these areas. The research studied the areas surrounding Baghdad International Airport and conducted a comprehensive survey of land uses within a distance of (4) km from the airport runway center. Then it conducted an analysis using geographical information systems(GIS) and studied the survey results, and assumed that the current uses of the areas surrounding international airports do not reflect the optimal use of these areas and, therefore, not exploiting the current capabilities and development opportunities provided by the airport for the surrounding areas. The research hypothesis is tested through the use of (GIS )and displaying the results of the field survey of land uses within the study area.

Furthermore, the methodology of comparative spatial analysis was done by monitoring the current situation through (GIS) and analyzing the result and comparing it with international standards to achieve results that contribute to attaining physical development. The first part of the research presents an introduction to international airports that are one of the most significant urban nodes in the city. The surrounding areas have many features that require regulation and coordination. The presence of incompatible uses in the vicinity of the airport leads to the loss of the advantages provided by the airport and the occurrence of adverse effects on the surrounding areas. Part two introduced compatible uses in the vicinity of airports. Part Three analyzed the case study of the areas surrounding Baghdad Airport. Then the results of the field survey showed that there are incompatible uses and the absence of compatible uses, and this case requires the identification of many planning procedures and benefiting from global trends in planning these areas.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Nov 01 2022
Journal Name
Alustath
Metrical Phonology in Modern Arabic Poetry
...Show More Authors

Providing stress of poetry on the syllable-, the foot-, and the phonological word- levels is one of the essential objectives of Metrical Phonology Theory. The subsumed number and types of syllables, feet, and meters are steady in poetry compared to other literary texts that is why its analysis demonstrates one of the most outstanding and debatable metrical issues. The roots of Metrical Phonology Theory are derived from prosody which studies poetic meters and versification. In Arabic, the starting point of metrical analysis is prosodic analysis which can be attributed to يديهارفلا in the second half of the eighth century (A.D.). This study aims at pinpointing the values of two metrical parameters in modern Arabic poetry. To

... Show More
Publication Date
Fri Dec 30 2011
Journal Name
Al-kindy College Medical Journal
T-Cells Proliferation and Serum Cytokine levels in Type 1 Diabetic Children
...Show More Authors

Background: There is plenty of evidence
suggesting that involvement of several groups of
viruses in the development and / or acceleration of
Type 1 Diabetes Mellitus (T1DM).
Objective: To analyze the T- cell proliferation in
the presence of Coxsackie virus B5 (CVB5), Polio
and Adenovirus antigens in addition to assessment
of Interferon- gamma (IFN-γ), Interleukins (IL-10
and IL-6).
Methods: In 60 Iraqi T1DM children with recent
onset of T1DM, Lymphocyte proliferation was
analyzed using Methylthiazol tetrazolium (MTT)
assay by culturing Peripheral Blood Lymphocytes
(PBLs) with Coxsackie Virus B5 (CVB5),
Adenovirus, and Polio vaccine. Serum Interferon-γ,
IL-10 and IL-6 were quantified by sandw

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 30 2011
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Laminar Free Convection in Three Dimensional Inclined Porous Annulus with Fins on the Inner Cylinder
...Show More Authors

An experimental and numerical study was carried out to investigate the heat transfer by natural convection in a three dimensional annulus enclosure filled with porous media (silica sand) between two inclined concentric cylinders with (and without) annular fins attached to the inner cylinder under steady state condition. The experiments were carried out for a range of modified Rayleigh number (0.2 ≤Ra*≤ 11) and extended to Ra*=500 for numerical study and for annulus inclination angle of (δ = 0˚, 30˚, 60˚ and 90˚). The numerical study was to give the governing equation under assumptions that used Darcy law and Boussinesq’s approximation and then it was solved numerically using finite difference approximation. It was found that t

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 20 2025
Journal Name
International Journal Of Advanced Research In Computer Science
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro

... Show More
View Publication
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Ghrelin and Leptin and Their Relations with Insulin Resistance in Diabetes Mellitus Type 2 Patients
...Show More Authors

Ghrelin and leptin are hunger hormones related to type 2 diabetes mellitus (T2DM), and the pathogenesis of T2DM is the abnormality in insulin secretion and insulin resistance (IR). The aim of this study is to evaluate ghrelin and leptin concentrations in blood and to specify the relationship of these hormones as dependent variables with some biochemical and clinical measurements in T2DM patients. In this study, forty one T2DM and forty three non-diabetes mellitus (non-DM) subjects, aged between 40-60 years and with normal weight, were enrolled. Fasting serum ghrelin and leptin were estimated by enzyme-linked immunosorbent assay (ELISA). In our results ghrelin was significantly increased, and leptin was significantly decreased, in T2DM pa

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Oct 10 2018
Journal Name
Al-kindy College Medical Journal
Recurrent Laryngeal Nerve Injury With Versus Without Nerve Identification In Different Thyroidectomy Procedures
...Show More Authors

Background: The world health organization estimates that worldwide 2 billion people still have iodine deficiency Objectives: Is to make comparison between the effect of identification of recurrent laryngeal nerve (RLN) and non-identification of the nerve on incidence of recurrent laryngeal nerve injury (RLNI) in different thyroidectomy procedures.

Type of the study: cross –sectional study.

Methods: 132 patients with goiters underwent thyroidectomy .Identification of RLN visually by exposure were done for agroup of them and non-identification of the nerves for the other group. The outcomes of RLNI in the two groupsanalyzed statistically for the effect of

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Baghdad Science Journal
Notes on Approximately Pure Submodules
...Show More Authors

Let R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be approximately pure submodule of an R-module, if for each ideal I of R. The main purpose of this paper is to study the properties of the following concepts: approximately pure essentialsubmodules, approximately pure closedsubmodules and relative approximately pure complement submodules. We prove that: when an R-module M is an approximately purely extending modules and N be Ap-puresubmodulein M, if M has the Ap-pure intersection property then N is Ap purely extending.

View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Sun Dec 05 2010
Journal Name
Baghdad Science Journal
ON M- Hollow modules
...Show More Authors

Let R be associative ring with identity and M is a non- zero unitary left module over R. M is called M- hollow if every maximal submodule of M is small submodule of M. In this paper we study the properties of this kind of modules.

View Publication Preview PDF
Crossref
Publication Date
Mon Feb 06 2023
Journal Name
Journal Of Toxicology
Zinc Chloride Can Mitigate the Alterations in Metallothionein and Some Apoptotic Proteins Induced by Cadmium Chloride in Mice Hepatocytes: A Histological and Immunohistochemical Study
...Show More Authors

The heavy metal cadmium is extremely harmful to both humans and animals. Zinc supplementation protects the biological system and reduces cadmium-induced toxicity. This study aimed to determine whether zinc chloride (ZnCl2) could protect male mice with the damaged liver induced by cadmium chloride (CdCl2). The protective role of zinc chloride and expression of the metallothionein (MT), Ki-67, and Bcl-2 apoptotic proteins in hepatocytes were studied after subchronic exposure of mice to cadmium chloride for 21 days. Thirty male mice were randomly categorized into 6 groups (5 mice/group) as follows: a control group that did not receive any treatment, a group given ZnCl2 at 10 mg/kg alone, and two groups received ZnCl2 (10 mg/kg) i

... Show More
View Publication
Scopus (10)
Crossref (8)
Scopus Clarivate Crossref