The process of soil classification in Iraq for industrial purposes is important topics that need to be extensive and specialized studies. In order for the advancement of reality service and industrial in our dear country, that a lot of scientific research touched upon the soil classification in the agricultural, commercial and other fields. No source and research can be found that touched upon the classification of land for industrial purposes directly. In this research specialized programs have been used such as geographic information system software The geographical information system permits the study of local distribution of phenomena, activities and the aims that can be determined in the local surrounding like points, lines and areas, where the geographical information system treats the data related to these points, lines and areas to make the data ready to be eturned for analysis or asking about certain information by using it. The research aims to employ the potential given by GIS use in the field for building geo data based for soil classification in Iraq and transferring the traditional paper maps into digital maps. Then making the layers that the maps made of and preparing the geo data base that are appropriate .After that analysis of these data is done which permits for less effort and cost and finally increasing in the production speed and accuracy.
Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreABSTRUCT
This research aims at examining the expected gap between the fact of planning and controlling process of production at the State Company for Electric Industries and implementation of material requirements planning system in fuzzy environment. Developing solutions to bridge the gap is required to provide specific mechanisms subject to the logic of fuzzy rules that will keep pace with demand for increased accuracy and reduced waiting times depending on demand forecast, investment in inventory to reduce costs to a minimum.
The proposed solutions for overcoming the research problem has required some questions reflecting the problem with its multiple dimensions, which ar
... Show MoreThe research aims to show the impact of the new modern malls on urban adjacent land uses; it handled concise study of the old markets, contemporary shopping malls, and the standards and regulations for commercial use. Sample study has been taken from new allocated malls in the city of Baghdad. The results of the sample analysis, and statistical analysis has proven hypothesis; that the locating of new malls impacted physical, social, and economic on urban adjacent, especially the exotic on urban fabric. It also turned out that the shopping demand from these malls is inelastic, which gives an opportunity to the planner and the decision-maker, to locate the modern new malls where spatial appropriate in the city are available. The major reco
... Show MoreThis research aims to examine the relationship between hydrothermal alteration and mineralization (ore mineralogy) in the study area and geological structures in the deformation mechanism. The hydrothermal alteration was determined based on petrographic analysis, and ore mineralogy which was determined based on the ore microscopic analysis. The deformation mechanism is determined by paleo stress analysis using win-tensor, and the direction of principal stress on joints/veins and faults is calculated by the right-dihedron method. Hydrothermal alteration includes silicification, argillic, propylitic, and phyllic alterations; and ore mineralogy consists of stibnite, cinnabar, pyrite, chalcopyrite, sphalerite, covellite, hematite, and a
... Show MoreTourism plays an important role in Malaysia’s economic development as it can boost business opportunity in its surrounding economic. By apply data mining on tourism data for predicting the area of business opportunity is a good choice. Data mining is the process that takes data as input and produces outputs knowledge. Due to the population of travelling in Asia country has increased in these few years. Many entrepreneurs start their owns business but there are some problems such as wrongly invest in the business fields and bad services quality which affected their business income. The objective of this paper is to use data mining technology to meet the business needs and customer needs of tourism enterprises and find the most effective
... Show MoreIn this study used three methods such as Williamson-hall, size-strain Plot, and Halder-Wagner to analysis x-ray diffraction lines to determine the crystallite size and the lattice strain of the nickel oxide nanoparticles and then compare the results of these methods with two other methods. The results were calculated for each of these methods to the crystallite size are (0.42554) nm, (1.04462) nm, and (3.60880) nm, and lattice strain are (0.56603), (1.11978), and (0.64606) respectively were compared with the result of Scherrer method (0.29598) nm,(0.34245),and the Modified Scherrer (0.97497). The difference in calculated results Observed for each of these methods in this study.
As long as Islamic banks cannot operate in an environment that deals with traditional banking instruments based on the interest rate (bank interest) that is prohibited by Article No. (6) of the Islamic Banking Law No. (43) of 2015 which stipulates that (do not deal in any activity that carries Interest (neither taking nor giving)). Therefore it seeks to provide an alternative strategic solution within the framework of the provisions and rules of Islamic Sharia, on the basis of participating in profit and loss to avoid the method of interest taking and giving, to find investment methods to provide new financial products, such as Islamic certificates of deposit and investment funds according to the method Murabaha, speculation (Mudar
... Show More