The integration of gender in urban studies is considered a goal and objective to build a society characterized by justice and equality. It further allows all its residents to enjoy the opportunities to live in a safe urban life. Based on the that, the limitations of the research and its field of interest related to the relationship between gender and urban studies have become clear. The insufficient knowledge in this regard considers gender as a concept that does not exist in itself, but rather overlaps and intersects with several concepts and studies, including urban studies. Thus, it has become necessary to adopt a descriptive methodology that helps reach a theoretical framework to explain the beginnings of such an interaction and integration between the two concepts. Such a step in return helps clarify the chronology of a number of conferences and their role in shedding light on gender issues focusing on the 2030 agenda. This is because such agenda is related to the near future and obligates all countries to achieve their goals where gender is one of them. Accordingly, the present work poses the question: Are gender studies and urban studies reciprocal and collaborative? The research ends with a set of conclusions, such as: the gender analysis of urban issues provides new insights and an explicit introduction to the study of gender and its effects in urban studies. They further illustrate the role of such insights on the development and prosperity of these cities to be suitable for all. The research has recommended integrating gender-sensitive planning strategies, as they represent a key factor to policy makers, urban planners, and designers in their policies, programs and decision-making processes. They also help create a sustainable and inclusive urban development.
Lower extremity exoskeletons can assist with performing particular functions such as gait assistance, and physical therapy support for subjects who have lost the ability to walk. This paper presents the analysis and evaluation of lightweight and adjustable two degrees of freedom, quasi-passive lower limb device to improve gait rehabilitation. The exoskeleton consists of a high torque DC motor mounted on a metal plate above the hip joint, and a link that transmits assistance torque from the motor to the thigh. The knee joint is passively actuated by spring installed parallel with the joint. The action of the passive component (spring) is combined with mechanical output of the motor to provide a good control on the designed exoskeleton whi
... Show MoreIn this paper, fire resistance and residual capacity tests were carried out on encased pultruded glass fiber-reinforced polymer (GFRP) I-beams with high-strength concrete beams. The specimens were loaded concurrently under 25% of the ultimate load and fire exposure (an increase in temperature of 700 °C) for 70 min. Subsequently, the fire-damaged specimens were allowed to cool and then were loaded statically until failure to explore the residual behaviors. The effects of using shear connectors and web stiffeners on the residual behavior were investigated. Finite Element (FE) analysis was developed to simulate the encased pultruded GFRP I-beams under the effect of fire loading. The thermal analyses were performed using the general-pu
... Show MoreA demonstration of the inverse kinematics is a very complex problem for redundant robot manipulator. This paper presents the solution of inverse kinematics for one of redundant robots manipulator (three link robot) by combing of two intelligent algorithms GA (Genetic Algorithm) and NN (Neural Network). The inputs are position and orientation of three link robot. These inputs are entering to Back Propagation Neural Network (BPNN). The weights of BPNN are optimized using continuous GA. The (Mean Square Error) MSE is also computed between the estimated and desired outputs of joint angles. In this paper, the fitness function in GA is proposed. The sinwave and circular for three link robot end effecter and desired trajectories are simulated b
... Show MoreThe differential protection of power transformers appears to be more difficult than any type of protection for any other part or element in a power system. Such difficulties arise from the existence of the magnetizing inrush phenomenon. Therefore, it is necessary to recognize between inrush current and the current arise from internal faults. In this paper, two approaches based on wavelet packet transform (WPT) and S-transform (ST) are applied to recognize different types of currents following in the transformer. In WPT approach, the selection of optimal mother wavelet and the optimal number of resolution is carried out using minimum description length (MDL) criteria before taking the decision for the extraction features from the WPT tree
... Show MoreThe study was carried out to detection of H.pylori in (200) patients who attended two teaching hospitals in Baghdad. The diagnosis done by Immunochromatography methods. Stools and blood samples was taken from each patient as well as other (30) healthy control matching in their age. The study included detection the Levels of Interleukin-40 and CRP in sera of patients and control. The result indicated presence of H pylori antigen in 115 cases 59 cases of males and 51 of females, Also, the result indicated increasing levels of IL-40, cholesterol, Triglycerides, Low density lipoprotein, Very Low density lipoprotein increased significantly while the level of High density lipoprotein decreased in patients sera in comparison with healthy c
... Show MoreIn this work, pure and doped Vanadium Pentoxide (V2O5) thin films with different concentration of TiO2 (0, 0.1, 0.3, 0.5) wt were obtained using Pulse laser deposition technique on amorphous glass substrate with thickness of (250)nm. The morphological, UV-Visible and Fourier Transform Infrared Spectroscopy (FT-IR) were studied. TiO2 doping into V2O5 matrix revealed an interesting morphological change from an array of high density pure V2O5 nanorods (~140 nm) to granular structure in TiO2-doped V2O5 thin film .Transform Infrared Spectro
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More