The topic of urban transformations has attracted the attention of researchers as it is one of the basic issues through which cities can be transformed towards sustainability. A specific level of transformation levels according to a philosophical concept known as a crossing. This article has relied on a specific methodology that aims to find a new approach for urban transformation based on the crossing concept. This concept derives from philosophical entrances based on the concepts of (being, process, becoming, and integration). Four levels have been for the crossing are (normal, ascending, leap, and descending). Each of these levels includes specific characteristics that distinguish it. The results showed that there is no descending crossing in the study area and that four indicators that have achieved leap crossing are: (coverage ratio, compactness, Effectiveness of the pedestrian and bicycle movement, and proximity. As for ascending crossing achieved in three indicators are: mix land use, blocks' length, and connectivity, as for normal crossing achieved in three indicators are: diversity of building heights, population density, and housing density. These results help in making the planning decision to transform traditional Karbala city into a sustainable city, by giving priority in development to the indicators that have achieved ascending crossing because it takes less time and effort to reach the leap crossing in comparison with indicators that have achieved normal crossing.
Background: Immediate postpartum contraceptive and post abortion contraception methods are effective safe methods and are becoming a standard practice in many countries, yet it is not widely used in Iraq.
Aims: this study: is designed to assess the attitude and willingness of women to immediate contraception after giving birth or abortion and their satisfaction to previous use.
Methods and Material: Four hundred thirty-four women were surveyed in the labor word immediately after giving birth/ abortion. Their knowledge, attitude and contraception use were assessed according to the response they reported to a given questionnaire.
Results: women were not sure abo
... Show MoreThe importance of physical and nonphysical architectural design values made architectural designers need good experience to be experts of architectural values reasonably without neglecting any value in the design process. The importance of such values made that ignoring any values and mistakes occurs in the design process. Simultaneously, architectural designers' different nature and the difference in their experiences are causing different understandings of the design values, thus causing architectural mistakes. The research problem appears from the randomly propagating of mistakes in contemporary architecture, which is about to become a phenomenon in Al Sulaymaniyah city. The research aims to find the main reason
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreMalware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreIn this paper we used frequentist and Bayesian approaches for the linear regression model to predict future observations for unemployment rates in Iraq. Parameters are estimated using the ordinary least squares method and for the Bayesian approach using the Markov Chain Monte Carlo (MCMC) method. Calculations are done using the R program. The analysis showed that the linear regression model using the Bayesian approach is better and can be used as an alternative to the frequentist approach. Two criteria, the root mean square error (RMSE) and the median absolute deviation (MAD) were used to compare the performance of the estimates. The results obtained showed that the unemployment rates will continue to increase in the next two decade
... Show MoreA new series of ?-D-glucose as Schiff bases derivatives is synthesized and characterized with studying their bioactivity. Hydroxyl groups at C (1,2&5,6) sugar moiety are converted into acetal form through a reaction with dry acetone using phosphoric acid and anhydrous zinc chloride as catalysts producing 1,2:5,6-di-O-isopropyledine ?-D-glucofuranose(I). The five memberd ring acetal of C(5,6) is hydrolyzed with acetic acid (65%)and a reaction of the new product with sodium periodate is carried on to get an aldehyde moiety which is used to produce a new series of Schiff bases through reacting with different amino compounds such as 4-amino antipyrene . The suggested chemical structures of the prepared compounds are confirmed by using UV., FT
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show More