The evolution of thought, planning for Urban Communities in the second half of the twentieth century, through several successive stages. He was thought of planning urban communities depends on identifying the general plan for land uses of the project area as a basis for drawing charts the physical, social, economic, and put the general plan for land uses based on the terms of reference set by the number of experts in the ministries and agencies. I have lived cities in the Arab-Muslim region, during the transition period the natural and historic environment, urban, sophisticated balanced ways mentioned in the cultural, social, inspired by the teachings of Islam and the customs and traditions of the Arab social, put forth a set of customs, laws and regulations harmonious own, distinct from the rest of the physical environments in the world. And contain any urban environment on the surface of this planet special features associated with social norms, cultural, economic and environmental associated with the physical environment or the other cities is the memory of communities taking into account the requirements of contemporary planning and urban development so that the interested nature of architectural and urban local and regional private, and establish the concept that what we build today will be a legacy for future generations, at the same time maintain the integration with the role of architectural heritage in the overall national development in general, and tourism development in particular
Future wireless networks will require advance physical-layer techniques to meet the requirements of Internet of Everything (IoE) applications and massive communication systems. To this end, a massive MIMO (m-MIMO) system is to date considered one of the key technologies for future wireless networks. This is due to the capability of m-MIMO to bring a significant improvement in the spectral efficiency and energy efficiency. However, designing an efficient downlink (DL) training sequence for fast channel state information (CSI) estimation, i.e., with limited coherence time, in a frequency division duplex (FDD) m-MIMO system when users exhibit different correlation patterns, i.e., span distinct channel covariance matrices, is to date ve
... Show MoreThe densities and visconsities of solutions of poly(vinyl alcohol)(PVA) molccuar weight (14)kg.mol-1in water up to 0.035%mol.kg-1
The aim of this study is for testing the applicability of Ramamoorthy and Murphy method for identification of predominant pore fluid type, in Middle Eastern carbonate reservoir, by analyzing the dynamic elastic properties derived from the sonic log. and involving the results of Souder, for testing the same method in chalk reservoir in the North Sea region. Mishrif formation in Garraf oilfield in southern Iraq was handled in this study, utilizing a slightly-deviated well data, these data include open-hole full-set logs, where, the sonic log composed of shear and compression modes, and geologic description to check the results. The Geolog software is used to make the conventional interpretation of porosity, lithology, and saturation. Also,
... Show MoreThe research aims to identify banking stress tests, which is one of the modern and important tools in managing banking risks by applying the equations of that tool to the sample. The banking sector considered one of the most vulnerable to sudden and rapid changes in an unstable economic environment, making it more vulnerable. Therefore, it is necessary to establish a special risk management section to reduce the banking risks of the banking business that negatively affect its performance.
The research concluded that there is a direct relationship between stress tests and risk management, as stress tests are an essential tool in risk management. They also considered a unified approach in managing bank risks that helps the bank to
... Show MoreAs cities across the world grow and the mobility of populations increases, there has also been a corresponding increase in the number of vehicles on roads. The result of this has been a proliferation of challenges for authorities with regard to road traffic management. A consequence of this has been congestion of traffic, more accidents, and pollution. Accidents are a still major cause of death, despite the development of sophisticated systems for traffic management and other technologies linked with vehicles. Hence, it is necessary that a common system for accident management is developed. For instance, traffic congestion in most urban areas can be alleviated by the real-time planning of routes. However, the designing of an efficie
... Show MoreThis research contributes to environmental sustainability by recycling natural waste resources in making clothing products. The research aims to employ palm trees waste in designing belts suitable for contemporary women's fashion trends. Both descriptive and applied research approaches were used. Therefore, a collection of belts was designed and implemented. Then, a questionnaire was used to assess the extent to which the implemented belts achieved in sustainability standards using Likert scale. The sample size was 60 women. The data were analyzed using the SPSS program to calculate the arithmetic mean and standard deviation. One of the significant results of the research is the high average scores of the criteria for achieving sustainab
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More