What makes the commercial advertisement distinct is the design structure which is built according to artistic and creative concepts and terms based on the visual and formal interdependence relationships to express the motives of the advertising idea, which is based in its action mechanism on the effective variables, some of which are related to the marketing aspect, and others related to the advertisement aspect. The major aspect is the functional and aesthetic variables, which are represented by the vocabulary of the advertisement area for the open spaces such as the street ads. Its promotional dimension is the active forces in the circulation of commodities and products. Therefore, there would be significant problems the designer rectifies to achieve more attraction, attention, and demand, as he derives that from the design action variables.
Permeability is one of the essential petrophysical properties of rocks, reflecting the rock's ability to pass fluids. It is considered the basis for building any model to predict well deliverability. Yamama formation carbonate rocks are distinguished by sedimentary cycles that separate formation into reservoir units and insulating layers, a very complex porous system caused by secondary porosity due to substitute and dissolution processes. Those factors create permeability variables and vary significantly. Three ways used for permeability calculation, the firstly was the classical method, which only related the permeability to the porosity, resulting in a weak relationship. Secondly, the flow zone indicator (FZI) was divided reservoir into
... Show MoreResearchers have recently increased their focus on the link between autoimmune diseases and infections. Most of the recent research indicates that silent human cytomegalovirus (HCMV), may have diverse roles in the initiation, development, and exacerbation of autoimmune diseases, such as coeliac Disease (CD) and inflammatory bowel disease. The aim of this study is to evaluate the role of HCMV infection in Iraqi patients with CD. Serum samples were obtained from 60 patients with CD, and from 60 healthy subjects. Enzyme-linked immunosorbent assay was used to determine the Anti-Transglutaminase IgG/IgA, Anti-gliadin IgA/ IgG, as well as the HCMV IgM/ IgG levels in the serum samples. Significantly higher percentage of positivity for seru
... Show MoreA study of irrigation water was conducted Baghdad city to find out extent of its pollution by some heavy metals (Pb, Cd, Ni, Co, CU, Cr, Zn and Fe). Water samples were collected randomly from different sources (river, well and stream). Results showed that the concentration of studied heavy metals were as follows: Lead between 0.43-11.75 mg L-1, Cadmium between 0.01-0.95 mg L-1, Nickel between 0.008-0.46 mg L-1, Cobalt between Nil - 0.185 mg L-1, Copper is between 0.326 - 1.58 mg L-1, Chromium is between Nil-0.068 mg L-1, Zinc 0.398-1.182 mg L-1, as for Iro
In the construction of buildings usually, problems occur because of the causes of change orders. The main causer of change orders is the owners, consultants, and contractors. These changes lead to conflicts among them which result in influencing building projects. Therefore, it is necessary to analyze the causes of change orders to reduce them and facilitate management. This paper determines the most critical factors that cause change orders from a different point of view, a consulting owner and a contractor, and a study of the reality of the management of change orders when constructing public buildings. The method employed in this research is a field survey using interviews with experts working in the construction of p
... Show MoreThe recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show More