The current research deals with studying the aesthetics of symbolic values in the design of internal spaces and their connotations through their existence as a material value, as well as the symbolic meanings and their connotations that touch the spiritual and emotional side of the human being as an intangible value, and the research included four chapters, so the research problem was embodied by the following question (What is the role of values Symbolism and aesthetics in the design of interior spaces)? Therefore, the aim was to clarify the role of symbolic values and their aesthetics in the design of internal spaces. The first chapter included the importance of research, the need for it, the limits of the research and its terminology. The second chapter included a detail of the theoretical framework that we relied on, which consisted of two topics. Internal design: Through these investigations, the theoretical framework indicators that feed into the topic of the research were reached, which helped in reaching a systematic method of research adopted in the third chapter, which included the research procedures, as we adopted the descriptive approach of the research community according to the justifications we clarified for analysis through frame indicators The theoretical, as for the fourth chapter, it included a review of the results, the most prominent of which was that the (Berlin) theater preserved the traditional form as a symbolic value and did not deviate from the familiar context of the design during the period in which it was established. As for the (Hamburg) theater, it achieved formal liberation and departed from the familiar system to express the strangeness and excitement Its shape as a symbolic value, while the conclusions were the most prominent of which was that the difference in intellectual orientations and within the period in which the whole theater was created led to the difference. In the aesthetics of the symbolic value of theater
It has increasingly been recognised that the future developments in geospatial data handling will centre on geospatial data on the web: Volunteered Geographic Information (VGI). The evaluation of VGI data quality, including positional and shape similarity, has become a recurrent subject in the scientific literature in the last ten years. The OpenStreetMap (OSM) project is the most popular one of the leading platforms of VGI datasets. It is an online geospatial database to produce and supply free editable geospatial datasets for a worldwide. The goal of this paper is to present a comprehensive overview of the quality assurance of OSM data. In addition, the credibility of open source geospatial data is discussed, highlighting the diff
... Show MoreHuman health was and still the most important problem and objective of all most researches. Finding out what causes in the decadence of healthiness of Iraqi population is our tendency in the present work, Uranium causing cancer that is affected by a correlation between age and gender of bladder cancer patients is studied in the present work. Mean of Uranium concentration (Uc) decreased with increasing age for all age group without dependency on gender. While, there is a wide dispersion in Mean Uc excretion between males and females, due to the effect of correlated gender with age, where female Mean Uc is maximum at age 50-69 year (2.355 µg/L), and it's higher than male Mean Uc (2.022 µg/L) in this age stage because of menopause, a
... Show MoreFor the most reliable and reproducible results for calibration or general testing purposes of two immiscible liquids, such as water in engine oil, good emulsification is vital. This study explores the impact of emulsion quality on the Fourier transform infrared (FT-IR) spectroscopy calibration standards for measuring water contamination in used or in-service engine oil, in an attempt to strengthen the specific guidelines of ASTM International standards for sample preparation. By using different emulsification techniques and readily available laboratory equipment, this work is an attempt to establish the ideal sample preparation technique for reliability, repeatability, and reproducibility for FT-IR analysis while still considering t
... Show MoreFinite Element Approach is employed in this research work to solve the governing differential equations related to seepage via its foundation's dam structure. The primary focus for this reason is the discretization of domain into finite elements through the placement of imaginary nodal points and the discretization of governing equations into an equation system; An equation for each nodal point or part, and unknown variables are solved. The SEEP / W software (program) is a sub-program of the Geo-Studio software, which is used by porous soil media to compensate for the problems of seepage. To achieve the research goals, a study was carried out on Hemrin dam, which located in the Diyala River 100 km northeast of Baghdad, Iraq. Thus, o
... Show MoreImage classification is the process of finding common features in images from various classes and applying them to categorize and label them. The main problem of the image classification process is the abundance of images, the high complexity of the data, and the shortage of labeled data, presenting the key obstacles in image classification. The cornerstone of image classification is evaluating the convolutional features retrieved from deep learning models and training them with machine learning classifiers. This study proposes a new approach of “hybrid learning” by combining deep learning with machine learning for image classification based on convolutional feature extraction using the VGG-16 deep learning model and seven class
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More