The integration of gender in urban studies is considered a goal and objective to build a society characterized by justice and equality. It further allows all its residents to enjoy the opportunities to live in a safe urban life. Based on the that, the limitations of the research and its field of interest related to the relationship between gender and urban studies have become clear. The insufficient knowledge in this regard considers gender as a concept that does not exist in itself, but rather overlaps and intersects with several concepts and studies, including urban studies. Thus, it has become necessary to adopt a descriptive methodology that helps reach a theoretical framework to explain the beginnings of such an interaction and integration between the two concepts. Such a step in return helps clarify the chronology of a number of conferences and their role in shedding light on gender issues focusing on the 2030 agenda. This is because such agenda is related to the near future and obligates all countries to achieve their goals where gender is one of them. Accordingly, the present work poses the question: Are gender studies and urban studies reciprocal and collaborative? The research ends with a set of conclusions, such as: the gender analysis of urban issues provides new insights and an explicit introduction to the study of gender and its effects in urban studies. They further illustrate the role of such insights on the development and prosperity of these cities to be suitable for all. The research has recommended integrating gender-sensitive planning strategies, as they represent a key factor to policy makers, urban planners, and designers in their policies, programs and decision-making processes. They also help create a sustainable and inclusive urban development.
As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show MoreThis paper aims to evaluate the reliability analysis for steel beam which represented by the probability of Failure and reliability index. Monte Carlo Simulation Method (MCSM) and First Order Reliability Method (FORM) will be used to achieve this issue. These methods need two samples for each behavior that want to study; the first sample for resistance (carrying capacity R), and second for load effect (Q) which are parameters for a limit state function. Monte Carlo method has been adopted to generate these samples dependent on the randomness and uncertainties in variables. The variables that consider are beam cross-section dimensions, material property, beam length, yield stress, and applied loads. Matlab software has be
... Show MoreOpenStreetMap (OSM), recognised for its current and readily accessible spatial database, frequently serves regions lacking precise data at the necessary granularity. Global collaboration among OSM contributors presents challenges to data quality and uniformity, exacerbated by the sheer volume of input and indistinct data annotation protocols. This study presents a methodological improvement in the spatial accuracy of OSM datasets centred over Baghdad, Iraq, utilising data derived from OSM services and satellite imagery. An analytical focus was placed on two geometric correction methods: a two-dimensional polynomial affine transformation and a two-dimensional polynomial conformal transformation. The former involves twelve coefficients for ad
... Show MoreGiven a matrix, the Consecutive Ones Submatrix (C1S) problem which aims to find the permutation of columns that maximizes the number of columns having together only one block of consecutive ones in each row is considered here. A heuristic approach will be suggested to solve the problem. Also, the Consecutive Blocks Minimization (CBM) problem which is related to the consecutive ones submatrix will be considered. The new procedure is proposed to improve the column insertion approach. Then real world and random matrices from the set covering problem will be evaluated and computational results will be highlighted.
This study seeks to highlights on the behavioral approach in organization theory as modern and effective entrance in constructing this theory and reflection extent on the behavior of both the product and the information user (accountant and financial information).
The study also focus on behavioral approach role in consolidating accounting concepts through making harmony between them so that the accountant can influence the user behavior with the concepts and principles of accounting in an effort to provide quality characteristic of accounting information produced by him in consistent with his behavior and information user and its impact on the decision making process by the latter.
... Show MoreThis research introduce a study with application on Principal Component Regression obtained from some of the explainatory variables to limitate Multicollinearity problem among these variables and gain staibilty in their estimations more than those which yield from Ordinary Least Squares. But the cost that we pay in the other hand losing a little power of the estimation of the predictive regression function in explaining the essential variations. A suggested numerical formula has been proposed and applied by the researchers as optimal solution, and vererifing the its efficiency by a program written by the researchers themselves for this porpuse through some creterions: Cumulative Percentage Variance, Coefficient of Determination, Variance
... Show MoreAbstract: Word sense disambiguation (WSD) is a significant field in computational linguistics as it is indispensable for many language understanding applications. Automatic processing of documents is made difficult because of the fact that many of the terms it contain ambiguous. Word Sense Disambiguation (WSD) systems try to solve these ambiguities and find the correct meaning. Genetic algorithms can be active to resolve this problem since they have been effectively applied for many optimization problems. In this paper, genetic algorithms proposed to solve the word sense disambiguation problem that can automatically select the intended meaning of a word in context without any additional resource. The proposed algorithm is evaluated on a col
... Show MoreThe minimum approaches distance of probing electrons in scanning electron microscope has investigated in accordance to mirror effect phenomenon. The analytical expression for such distance is decomposed using the binomial expansion. With aid of resulted expansion, the distribution of trapped electrons within the sample surface has explored. Results have shown that trapped electron distributes with various forms rather an individual one. The domination of any shape is mainly depend on the minimum approaches distance of probing electrons
The current research aims to know the measurement of the fifth- secondary stage female students' affliction with the social phobia . The research is confined to General directorate of Education in Baghdad / Al-Karkh/2 / for the academic year 2015-2016 and fifth-secondary stage female students. It has been used descriptive method and exposed theoretical sides and previous studies concerning with the social phobia.The procedures of the research include the application of the social phobia scale on random sample of fifth- secondary stage female students ( both branches scientific and literary). The current study has concluded that the fifth- secondary stage female students have&nbs
... Show More