Preferred Language
Articles
/
joe-450
Importance of New Use of Concrete in Iraq Analysis of Development And Use of Concrete in Architecture
...Show More Authors

Since its invention by the Ancient Romans and later developed during the mid-18th century, the concrete structure and finish, has been considered as the most powerful, practical, economic and constructional material that meets the building’s architectural and aesthetical requirements. By creating unique architectural forms, the pioneer architects used concrete widely to shape up their innovative designs and buildings.

The pre-mixed ultra-high performance concrete which manufactured by Lafarge.

The transparent concrete and cement that allow the light beams to pass through them, introduces remarkable well-lit architectural spaces within the same structural criteria. This product is a recyclable, sustainable, friendly environmental and cost efficient back up.

Due to its characteristics, strength, flexibility, affordability and long term performance, the concert integrated and contributed in modern architecture, urbanism and civil developments. Apparently, most of the 20th Century architects employed high-tech concrete method to deliver Iconic and bespoke architectural monuments world-wide. The interaction between the architectural form and the concrete as a buildable, executable, structural and constructional material has been always the main concern for architects over generations.

The formalism in architecture was first identified by the Art-Nouveau movement during the early 20 century in Europe as well as in Northern America. It formed, utilized and sculptured the concert to meet the use, function, aesthetical and spatial needs of spaces. This wave generated series of most significant, outstanding and impressive buildings in the architectural symbolized record.

This was followed by the Brutalism architecture presented by Alison and Peter Smithson in England and also by Le Corbusier works in Marseille and India. However, Alvar Alto and Louis Khan have participated and established a tremendous use of concrete to erect public interest developments on the same era

The concert as a structural element dominated the Metabolism architecture that represented by the Japanese architects like Kiyonori Kikutake, Kisho Kurokawa, Noboru Kawazoe, Masato Otakaand and Fumihiko Maki. They visualized the city of the future to be viable, evaluable, expandable, flexible structures that evoked the processes of organic growth as it is in nature. Their developments are often called technocratic and described as avant-garde with a rhetorical character. The Metabolist mega structures heavily relied on advanced technology and adaptable plug-in building techniques in using this material.

The research concluded the influences of the concrete as a building material upon the modern and building forms from the outsets. By exploring the history of the material, expanding its characteristics and specifications and later demonstrating the modern architecture movements and architects, this research has achieved its targets to acknowledge the importance of concrete in the current construction market and architectural developments.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 15 2018
Journal Name
Journal Of The College Of Education For Women
The relationship between the muslim authorities and prominent Christian personalities within their territories
...Show More Authors

 

The prophet said that it anybody burdened any of the people or the book more than they could endure he would ben his opponent until the day of judgment.

-under the rightly guided caliphs the Christians had much freedom .this is shown by a letter attributed to ishu-yab III. The Nestorian catholics.

-The third caliph,Uthman favoured the Christians either because of the spcial skills or abilities which they possessed or through the imfluence of his Christian wife Na'ila.

-Under the early Umayyade,the christiansins the Isalamic umma had as much freedom as they had previously enjoyed under the best of their Christians governments because they restorted their churches and appointed many Christians to the

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Mon Feb 07 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Mathematical connection skills and their relationship with productive thinking among secondary school students
...Show More Authors

View Publication
Crossref (8)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Blockchain Technology and its Potential Effect on the Banking Industry (China Case Study)
...Show More Authors

The aim of the research is to investigate potential effects of the finance industry and block-chain to general business of financing in particular, as well as its shortcomings and difficulties. To answer the research questions, the researcher used the objective narrative-analytical descriptive approach and included a qualitative analysis of Blockchain technology. The process of Blockchain technology based on their industries, the authors were selected based on their reputation in the Blockchain field. The research found that Blockchain can improve the efficiency of the banking industry's various sections. It has the ability to upgrade and transfer wages across borders, financial reporting and compliance, as well as trade finance

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 23 2015
Journal Name
Nature Communications
A metabolic stress-inducible miR-34a-HNF4α pathway regulates lipid and lipoprotein metabolism
...Show More Authors

View Publication
Scopus (220)
Crossref (218)
Scopus Clarivate Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (31)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Industrial And Engineering Chemistry
Petroleum refinery wastewater treatment using a novel combined electro-Fenton and photocatalytic process
...Show More Authors

View Publication
Scopus (21)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (4)
Scopus Crossref