The building of the Babylonian theater is considered as one of the distinctive buildings where its foundations have remained steadfast in the face of geographical changes, social's erosion and groundwater that threatened almost all traces of Babylon despite the destruction of the outer structure of the building. The general directorate of antiques performed prospection for those foundations (the ground map), and then the building was completed by new bricks over the original scheme. It became clear when examining the building; its components and foundations, that the building is unique in comparison with the old buildings of the world throughout Iraq. There are similar buildings in other places like Jordan and North Africa such as Leptis Magna's theater and Sabratha's theater which were built by the Greeks in Libya. A confusion has been emerged about the real builder of the theater where there is no document dated whether the building attributed to a company or a person. To manage this problem, the researcher reviewed the historical documents that could refer to that case. Moreover, he conducted an architectural and sociological comparison between Babylonian theater and the Greek and Roman theaters which were known and built in synchronized intervals with the creation of the Babylonian theater in order to know the differences and similarities between them.The researcher used descriptive and comparative method in the analysis, based on historical documents in order to reach logical conclusions that may dispel those doubts and solve the problem.The most important findings were the existence of the Babylonian theater building before entering Alexander the Great to the city of Babylon, the uniqueness and specificity of this building and the lack of full similarity between Babylonian theater and the Greek and Roman theaters
Emotions are part of the personality of the individual and affect many different aspects of the personality, and it is an important element of social and psychological adaptation, especially if it is within the limits of nature, and if the methods used to express them are appropriate and moderate.
Submission is one of the characteristics that express the way an individual relies upon in dealing with others and in dealing with matters of life. An individual who complies with instructions and orders and abides by them, and performs what is required of him without hesitation or delay. Adolescence is an important and accurate stage in the constructive development of an individual and in his psychological and social life.
The
... Show MoreIt is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.
Compression is the reduction in size of data in order to save space or transmission time. For data transmission, compression can be performed on just the data content or on the entire transmission unit (including header data) depending on a number of factors. In this study, we considered the application of an audio compression method by using text coding where audio compression represented via convert audio file to text file for reducing the time to data transfer by communication channel. Approach: we proposed two coding methods are applied to optimizing the solution by using CFG. Results: we test our application by using 4-bit coding algorithm the results of this method show not satisfy then we proposed a new approach to compress audio fil
... Show MoreIn this paper, an algorithm is suggested to train a single layer feedforward neural network to function as a heteroassociative memory. This algorithm enhances the ability of the memory to recall the stored patterns when partially described noisy inputs patterns are presented. The algorithm relies on adapting the standard delta rule by introducing new terms, first order term and second order term to it. Results show that the heteroassociative neural network trained with this algorithm perfectly recalls the desired stored pattern when 1.6% and 3.2% special partially described noisy inputs patterns are presented.
The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreMultiple sclerosis (MS) is a neurodegenerative disorder with various clinical types. Glial fibrillary acidic protein (GFAP) is significantly elevated in the cerebrospinal fluid (CSF) of MS patients compared with that of healthy controls. The aim of this study is to evaluate serum levels of GFAP in relation to disease activity in relapsing-remitting MS patients and to compare them with those of healthy controls. Method: This study involved 58 MS patients of relapsing-remitting MS (RRMS) type, 22 in an active stage of the disease and 36 in remission, and 50 healthy individuals as age- and sex-matched controls. Blood samples were taken from the patients at the MS Clinic of the Baghdad Teaching Hospital, and the serum levels of GFAP were determ
... Show MoreThe aim of t his p aper is t o const ruct t he (k,r)-caps in t he p rojective 3-sp ace PG(3,p ) over Galois field GF(4). We found t hat t he maximum comp let e (k,2)-cap which is called an ovaloid, exist s in PG(3,4) when k = 13. Moreover t he maximum (k,3)-cap s, (k,4)-cap s and (k,5)-caps.
September 11th attacks held the biggest tragedy in American history. It was a day of grief, and it proved that America was not immune to attacks and threat. Afterwards life has changed not only for the American Muslims but also American Christians and Jews and to people from other religions. The cruelty of that day has left its shed particularly on the Muslims’ life in America who in reality had nothing to do with the attacks. Arab American Muslim writer Laila Halaby’s novel, Once in a Promised Land, intensely displays the problems that Arab Muslims went through after September 11th attacks. This paper discusses this issue through analysing Halaby’s novel, where she deals with the issues such as discrimination, stereotype, and prejudi
... Show MoreBackground: This study aimed to determine the cephalometric values of tetragon analysis on a sample of Iraqi adults with normal occlusion. Material and methods: Forty digital true lateral cephalometric radiographs belong to 20 males and 20 females having normal dental relation were analyzed using AutoCAD program 2009. Descriptive statistics and sample comparison with Fastlicht norms were obtained. Results: The results showed that maxillary and mandibular incisors were more proclined and the maxillary/mandibular planes angle was lower in Iraqi sample than Caucasian sample. Conclusion: It's recommended to use result from this study when using tetragon analysis for Iraqis to get more accurate result.