Preferred Language
Articles
/
joe-381
Values and technology in architecture - the impact and vulnerability
...Show More Authors

Technology is an important factor for achieving architecture as an impact and vulnerability. It represents one of the significant elements in creating the intellectual framework, as well as having its own intellectual breakdown, while values constitute the most important and obviously factor of the community's intellectual. Research aims was determined accordingly by: investigating the role and impact of values and their relationship to technology in architecture.

In this context, the research investigated values and technology in architecture, through discussing their aspects and dimensions in architecture. In the context of values, the research discussed their concept and the related ones to have a concrete definition, and discussed manifestations in terms intellectual and social system represented by value's judgment and value's system, that  creating the most important factor for the differentiation communities, which were leading to the study of values in architecture. In this context, the research identifies trends of values in architecture to determine and adopt the private values-oriented in architecture.

In the other hand, the research discussed the concept of technology, its impact on the architecture through dealing with architectural technology and its dimensions according to the context.  A focus was made on the intellectual dimension, which lies under the physical aspect of the technology. Then a convergence technology utilization and the expressive aspects was made within an input and output of architectural practice which implemented on selected projects. A set of conclusions was achieved regarding the theoretical research framework and the case study as well.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Agricultural And Statistical Sciences
USE OF MODIFIED MAXIMUM LIKELIHOOD METHOD TO ESTIMATE PARAMETERS OF THE MULTIPLE LINEAR REGRESSION MODEL
...Show More Authors

Scopus
Publication Date
Sun Sep 30 2018
Journal Name
Scientific Journal Of Silesian University Of Technology. Series Transport
Measuring the relative importance of applying engineering solutions to urban traffic intersections: a planning perspective
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Tue Jul 14 2020
Journal Name
Materials Science Forum
The Cyclic Fatigue Behavior for 6061-T6 Al Alloy Shafts Processed by Laser Shock Peening
...Show More Authors

The optimal combination of aluminum quality, sufficient strength, high stress to weight ratio and clean finish make it a good choice in driveshafts fabrication. This study has been devoted to experimentally investigate the effect of applying laser shock peening (LSP) on the fatigue performance for 6061-T6 aluminum alloy rotary shafts. Q-switched pulsed Nd:YAG laser was used with operating parameters of 500 mJ and 600 mJ pulse energies, 12 ns pulse duration and 10 Hz pulse repetition rate. The LSP is applied at the waist of the prepared samples for the cyclic fatigue test. The results show that applying 500 mJ pulse energy yields a noticeable effect on enhancing the fatigue strength by increasing the required number of cycles to fracture the

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Mar 08 2026
Journal Name
Al-mustansiriyah Journal Of Science
Epidemiological Study to Investigate a Possible Vector of Visceral Leishmaniasisin the Central Region of Iraq
...Show More Authors

An epidemiological study in Al-Mahmmodiya (50 km south Baghdad) to investigate a possible vector of Leishmaniasis were applied .This region is considered as a foci of Leishmaniasisaccording to the health association statistics. CDC light traps were used to collect the insects nightly. Insects were collected by Indoor application as human dwellings and animal shelters and Outdoor application as rodent's barrows and field trees. Sand flies were transported to the laboratory, isolated and identified according to the identification keys in Tropical Biological Researches Unit at the Collage of Science / University of Baghdad. Must of the collected sand flies were belonging to three species PhlebotomuspapatasiScopoli(45%), PhlebotomusalexandriSin

... Show More
View Publication
Publication Date
Sun Jan 24 2016
Journal Name
Al-academy
The Instagram from a media tool to a marketing tool: بتول السيد مصطفى جواد أحمد
...Show More Authors

The subject of this study is one of the most interactive media networks, which is the Instagram.The study uses a descriptive approach and focuses on how Instagram turns from a media tool to a marketing tool. The study problematic consists of this question: How Instagram turns to a marketing tool, and what are the advantages and the disadvantages for that?This study highlights the definition of Instagram, the creation of it and its improvement, the Instagram in Bahrain, the Instagram uses, the Instagram as a marketing tool, and the advantages and disadvantages of using Instagram for marketing.The study confirms that Instagram is a new media network, and focuses on how it develops on later stages and mentions the increase of the percentage

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 19 2022
Journal Name
Advances In Continuous And Discrete Models
Geometric properties of the meromorphic functions class through special functions associated with a linear operator
...Show More Authors
Abstract<p>According to the theory of regular geometric functions, the relevance of geometry to analysis is a critical feature. One of the significant tools to study operators is to utilize the convolution product. The dynamic techniques of convolution have attracted numerous complex analyses in current research. In this effort, an attempt is made by utilizing the said techniques to study a new linear complex operator connecting an incomplete beta function and a Hurwitz–Lerch zeta function of certain meromorphic functions. Furthermore, we employ a method based on the first-order differential subordination to derive new and better differential complex inequalities, namely differential subordinations.</p>
View Publication Preview PDF
Scopus (9)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Sep 24 2019
Journal Name
Journal Of Engineering
Effect of Use Recycled Coarse Aggregate on the Behavior of Axially Loaded Reinforced Concrete Columns
...Show More Authors

Nowadays, the use of recycled waste construction materials instead of aggregates is becoming popular in construction owing to its environmental benefits. This paper presents an experimental and analytical campaign to study the behavior of axially loaded columns constructed from recycled aggregates. The latter was used instead of natural aggregates, and they were collected from the waste of previous concrete constructions. Different concrete mixtures made from varying amounts of recycled aggregates ranged from 0 to 50% of the total coarse aggregate were conducted to achieve 28 MPa. The effect of steel fibers is another investigated variable with volumes ranged from 0 to 2% concerning concrete’s mixture. The experimental

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Tue Dec 25 2018
Journal Name
Summaries Of Working Papers, Research And Experiments
E-learning at the College of Mass Communication, subject: public relations campaigns as a model
...Show More Authors

Publication Date
Mon Aug 01 2011
Journal Name
International Journal Of Research And Reviews In Computer Science
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Effect of risk selection policy for life insurance on the prodectivity of iraqi insurance company
...Show More Authors

The life insurance companies need a sound system to use it in selecting Insurable risks so they can avoid or reduce possible losses that may be insured to a minimum levels , But the application within IRAQI INSURANCE  COMPANY reflects that it still depends on a traditional ways in the procedures used to select that risks .

                 This  research represents an attempt to put acceptable suggestions about developing a system for selecting insurable risks which used now by iraqi insurance company by recognizing the risks of life insurance , determining kinds of risks which can difined as normal and upnormal risks , rectification of the

... Show More
View Publication Preview PDF