Preferred Language
Articles
/
jpd-185
The relationship between the uses of land and the network of movement and roads (study area, Najaf city)
...Show More Authors

The interaction in the city is reflected in the movement of people motivated by their activities and their economic and social goals, which include many variables subject to the planning process in the interpretation of this movement and the mapping of trends of transport intensity through the concept of transport function and its functional relationships with the uses of the earth in the sustainability and effectiveness of the movement of transport and Economic activity and population movement. Transport planners are concerned with the requirements of land use, which are linked to and included in the transport planning process as a factor for the future transport needs. There is a strong relationship between the transport system and the land use system. Any change in patterns The movement is followed by a change in land uses, and these new uses will generate new passage. It is therefore possible to identify the research problem of the importance of the definition of the joints of functional correlation between the uses of different land and the impact (and impact at the same time), on the network of roads within and outside the city. As a conclusion, it is possible to say that the concentration and high density of traffic is confined to the main centers of the city and continues in the adjacent areas, which are characterized by the predominance of the use of a single function often on them, gradually leading to the loss of dominance of that use and balance with residential use and the needs of its uses such as services Educational, recreational and financial.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Development and innovation in the theory of singing   In the Umayyad era
...Show More Authors

The Umayyad era is characterized by the diversity of the subjects and their multiplicity in the literary phenomena. These phenomena are singing phenomena, although they were known in previous eras, they took a distinctive form in the era.
  In this light, the researcher tried to prove that singing theory in the Umayyad period was characterized by development and renewal. The research was entitled (evolution and renewal in the theory of singing in the Umayyad era).

View Publication Preview PDF
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Induction informational, informational use, the behavior of the product and user information.
...Show More Authors

Abstract:

This study seeks to shed light on the important processes are linked to the impact of accounting information on the behavior of producer and user of information and are urging informational and informational use. That accounting as a system of accounting information and functions of the delivery of information to decision makers Under behavioral entrance to the formulation of accounting theory should be taken into account Othertlk accounting information in the behavior of the decision maker which requires an explanation of human behavior and predictable.

On the other hand that the accounting information that should be delivered to the decision maker will affect your beha

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The auditor's qualifications and their role in the quality of professional performance
...Show More Authors

 

Abstract

The aim of the research is to clarify the requirements of the qualification of the external auditor in Iraq and the extent of their impact on the quality of the professional performance of the audit process. The research was based on analyzing the results of the questionnaire prepared for the impact of qualifications on the quality of professional performance. The researcher has reached a number of conclusions, the most important of which is that a highly qualified and unethical auditor has a greater negative impact on the quality of professional performance than those with low qualifications. The most important recommendations of the research were the need to pay

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Improve the efficiency of the cell Ch neutron irradiation and thermal annealing
...Show More Authors

This research aims to study the effect of heat on the efficiency of solar cells of neutrons ranging from card to these cells in the case of dark and light before and after irradiation using the neutron source as well as electrical properties have been studied

View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
College Of Islamic Sciences
The wisdom of establishing the right by testimony in jurisprudence and law
...Show More Authors

 

Abstract

Islam has been concerned with preserving and maintaining rights, so the provisions in which it is preserved are legislated. Among that  is the testimony that made it a way to prove the truth and obliges its bearer to fulfill right in order to preserve the right and establish justice and prevent injustices by defying conflict, and tyranny .

And while acknowledging that divine absolute wisdom that is the cause and origin of legal rulings is sufficient, it is obligatory to abide by its provisions and imposes obedience, surrender, contentment and work in accordance with its controls.

However, the realization of the defects behind the legislation in a comprehensive way that realizes the dev

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Illegal migration and the European Union " a perusal of securing the phenomenon"
...Show More Authors

Abstract This study seeks to deal academically with how the EU treats clandestine immigration, through adopting a purley security approach, based on the European understanding of security threats posed to the security of communities and States in EU at all levels. So they agreed upon criminalizing this threat within the bloc while using repressive tools and steps to limit illegal immigrants flow to European territories. Accordingly, the EU gave the phenomen a security character. So it takes it from low politics level , that of employment and economic field to that of high politics, as a new security problem lying within a new security language embraced by ruling European elites, in other words EU touched on this issue as a speech act emp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Social orientation of the marketing and its role in the competitive strategies
...Show More Authors

     This research shed light on the relationship between the social orientation of the marketing (interests of the Organization ,the welfare of society, satisfaction the customer) strategies competitive dimensions of (cost leadership strategy, differentiation strategy, focus and strategy), As well as to to seek to achieve a number of knowledge and applied goals, and represented the field research problem extent of interesting researched the application of social orientation and interest in achieving competitive strategy and omission of this interest in the hotels the surveyed Organization, Based on this problem, and to clarify the relationshi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Face Recognition and Emotion Recognition from Facial Expression Using Deep Learning Neural Network
...Show More Authors
Abstract<p>Face recognition, emotion recognition represent the important bases for the human machine interaction. To recognize the person’s emotion and face, different algorithms are developed and tested. In this paper, an enhancement face and emotion recognition algorithm is implemented based on deep learning neural networks. Universal database and personal image had been used to test the proposed algorithm. Python language programming had been used to implement the proposed algorithm.</p>
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Mon Apr 11 2011
Journal Name
Icgst
Employing Neural Network and Naive Bayesian Classifier in Mining Data for Car Evaluation
...Show More Authors

In data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.