The research presented the experience of creating a new sustainable city, and this experience of establishing an Eco-City (Environmentally friendly) is considered the first experience in Iraq. The current study stressed the importance of the need for environmental planning in the early stages of planning new cities based on realism in planning, design and implementation. Subsequently, that aims to preserve the ecosystem, which is difficult to compensate if degraded or polluted. The research incorporated environmental planning indicators within sustainable urban planning (Reliance on generating electric power that is based on clean and renewable energy sources, Availability of public transport services and pedestrian paths, providing green and open areas, approval the principle of mixed use of urban land; reuse of treated wastewater for various urban usages, as well as an interest in solid waste management and recycling residual wastes. Community participation, intensification and compactness within urban areas are evaluating by indicators conducting statistical analysing, and discussing results within methods and strategies of sustainable urban planning and their compatibility for implementation in new cities in Iraq. The main research contribution was to plan a new Eco-City integrated and comprehensive, healthy and liveable city that provides comfort and luxury to residents, taking into account environmental planning. Another contribution is presenting by eliminating informal housing and reducing pressure on social and technical services within the existing Samawah city, especially study area is adjacent to Samawah existing city.
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreNewly series of 6,6’-((2-(Aryl)dihydropyrimidine-1,3(2H,4H)-diyl)bis(methylene))bis(2-methoxy phenol) (3a-i) were synthesized from cyclization of 6,6’-((propane-1,3-diylbis (azanediyl)) bis(methylene)) bis(2-methoxyphenol) with several aryl aldehyde in the presence of acetic acid. The newly compounds characterized from their IR, NMR and EIMs spectra. The antioxidant capacity of these compounds screened by utilizing DPPH and FRAP assays. Compounds 3g and 3i exhibited significant antioxidant capability in both assays. Docking study for these compounds as a potential inhibitors of gyrase enzyme were carried out. Compound 3g exhibited significant inhibition with binding free energies (DG) higher than novobiocin. compounds 2, 3a, 3b, 3
... Show MoreIn the present work a theoretical analysis depending on the new higher order . element in shear deformation theory for simply supported cross-ply laminated plate is developed. The new displacement field of the middle surface expanded as a combination of exponential and trigonometric function of thickness coordinate with the transverse displacement taken to be constant through the thickness. The governing equations are derived using Hamilton’s principle and solved using Navier solution method to obtain the deflection and stresses under uniform sinusoidal load. The effect of many design parameters such as number of laminates, aspect ratio and thickness ratio on static behavior of the laminated composite plate has been studied. The
... Show MoreIn this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.
... Show MoreA new method for determination of allopurinol in microgram level depending on its ability to reduce the yellow absorption spectrum of (I-3) at maximum wavelength ( ?max 350nm) . The optimum conditions such as "concentration of reactant materials , time of sitting and order of addition were studied to get a high sensitivity ( ? = 27229 l.mole-1.cm-1) sandal sensitivity : 0.0053 µg cm-2 ,with wide range of calibration curve ( 1 – 9 µg.ml-1 ) good stability (more then24 hr.) and repeatability ( RSD % : 2.1 -2.6 % ) , the Recovery % : ( 98.17 – 100.5 % ) , the Erel % ( 0.50 -1.83 % ) and the interference's of Xanthine , Cystein , Creatinine , Urea and the Glucose in 20 , 40 , 60 fold of analyate were also studied .
The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreHeterogeneous organic compounds play an important role in our daily life as they contribute in many medical and industrial fields and are in continuous development as a result of the preparation of new derivatives with different properties. From this premise, the goal of this work appears, which is preparation of (four, five, six, and seven) membered ring systems derived from furfural, by its reaction with different aromatic aldehydes, and record their antioxidant activity by using free radical scavenging method of DPPH radicals. The new ring systems are synthesized by reacting the prepared Schiff-bases with different ring closure agents (chloroacetyl chloride, mercaptoaceticacid, anthranilic acid, and phthalic anhydride), the prep
... Show MoreFive membered heterocyclics derivatives were synthesized in this work by three routes. The first route includes the synthesis of N-benzoic acid 1,2,3,-triazole derivatives (3),(4) by diazotation of methyl-2-amino benzoate and treating the resulted salt (1) with sodium azide and ethyl acetoacetate or acetyl acetone, respectively. In the second route, derivatives of pyrazole (8) pyrazolin-5-one (9), (10) were prepared by the reaction of the salt (1) with some active methylene compounds to give the corresponding hydrazones derivatives (5-7) which then they were treated with hydrazine hydrate. The third route afforded the synthesis of three derivatives (12), (15a), (15b) of thiazolidinone by two different methods. AII compounds were confirmed b
... Show MoreSeveral new derivatives of 1, 2, 4-triazoles linked to phthalimide moiety were synthesized through following multisteps. The first step involved preparation of 2, 2-diphthalimidyl ethanoic acid [2] via reaction of two moles of phthalimide with dichloroacetic acid. Treatment of the resulted imide with ethanol in the second step afforded 2, 2-diphthalimidyl ester [3] which inturn was introduced in reaction with hydrazine hydrate in the third step, producing the corresponding hydrazide derivative [4]. The synthesized hydazide was introduced in different synthetic paths including treatment with carbon disulfide in alkaline solution then with hydrazine hydrate to afford the new 1, 2, 4-triazole [10]. Reaction of compound [10] with different alde
... Show More