Today, the architecture field is witnessing a noticeable evolution regarding the used tools that the designer should invest in a peculiar way that is made available in architecture through the concept of synergy generally and algorithmic synergy specifically. The synergy is meant to study and analyze the cooperative behavior of complex systems and self-organizing systems that leads to different outputs referred to by the synergy as the (whole), which is bigger than the sum of parts and in architecture, it's translated as the architectural form. This point resulted in a need of a specific study regarding the concept of synergy that focuses on the cooperative, synergistic relations within the trilogy of (form, structure, and material) and clarifies the role of technological evolution of design tools through algorithmic synergy in formulating that relation, thus resulted in the research's problem which came in the following statement (The lack of clear knowledge of the algorithmic synergy and its mechanisms in generating and discovering the architectural form digitally) and to solve this problem and Achieving the research goal which is represented in (Clarifying the knowledge regarding the role of algorithmic synergy and its mechanisms in generating and discovering the architectural form digitally), the research clarifies the concept of "Synergy" in general and "Algorithmic Synergy" precisely in order to get the epitome of vocabulary on the theoretical part and moving on to the practical application on elected projects samples moving on to the conclusions and recommendations that shows having the architecture a self-organizing synergy system connects the designer and the developed digital tool that is provided by algorithmic synergy, plays a vital role in reaching the digitally synergized whole that represented by the architectural form.
Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreTThe property of 134−140Neodymium nuclei have been studied in framework Interacting Boson Model (IBM) and a new method called New Empirical Formula (NEF). The energy positive parity bands of 134−140Nd have been calculated using (IBM) and (NEF) while the negative parity bands of 134−140Nd have been calculated using (NEF) only. The E-GOS curve as a function of the spin (I) has been drawn to determine the property of the positive parity yrast band. The parameters of the best fit to the measured data are determined. The reduced transition probabilities of these nuclei was calculated. The critical point has been determined for 140Nd isotope. The potential energy surfaces (PESs) to the IBM Hamiltonian have been obtained using the intrin
... Show MoreExcessive torque and drag can be critical limitation during drilling highly deviated oil wells. Using the modeling is regarded as an invaluable process to assist in well planning and to predict and prevent drilling problems. Identify which problems lead to excessive torque and drag to prevent cost losses and equipment damage. Proper modeling data is highly important for knowing and prediction hole problems may occur due to torque and drag and select the best method to avoid these problems related to well bore and drill string. In this study, Torque and drag well plan program from landmark worldwide programming group (Halliburton Company) used to identify hole problems.one deviated well in Zubair oil fields named, ZB-250 selected for
... Show Moreأجريت هذه الدراسة في محافظة النجف بالعراق لتحليل عينات بيولوجية من المدخنين وغير المدخنين. تم استخدام العينات، بما في ذلك مصل الدم والبول والشعر والأظافر، كمؤشرات حيوية لتحديد تركيزات اليورانيوم (UC) ونظائره (238U، 235U، و234U). وباستخدام طريقة التعرض الطبيعي، تم استخدام كاشف المسار النووي (CR-39، المملكة المتحدة) لقياس تركيزات اليورانيوم في العينات. تم جمع خمسة وسبعين عينة من مصل الدم والبول والشعر والأظافر للمد
... Show MoreThe presence of alkaloids in Crassula ovata is a topic that is still unexplored, as there are no published studies on the matter. This study demonstrates the presence of an alkaloid compound (and its class) for the first time in Crassula ovata. The plant material was defatted with n-hexane, and a Soxhlet apparatus was used for the extraction process, while the acid-base method was used for the isolation of alkaloids from the chloroform fractions. The quaternary alkaloid was precipitated from the aqueous layer spontaneously, in high quantity. By using standard spectroscopic methods (including liquid chromatography - mass spectroscopy) we were able to clarify the structure of the precipi¬tated compound as a tetrahydroprotoberberine a
... Show MoreThe present study aims at assessing the effects of chronic kidney disease (CKD) on thyroid hormone and leptin by evaluating the level of: leptin hormone along with thyroid hormone in CKD patients. The study has been conducted on 70 subjects, 50 patients with an age range between 20-50 years (25 males and 25 females) who were diagnosed to have CKD stage-5, and 20 normal controls whose ages ranged between 20-48 years (10 males and 10 females), who attended the Nephrology and Transplant Center in Medical City of Baghdad- Iraq from April 2018 to July 2018. The study showed a highly significant (P<0.01) increase in TSH level in CKD patients in comparison with controls. While T3 and T4 levels observed highly significant decrea
... Show More