The city has normal natural state, and the man has a usual movement, change and search for the new .Also, the city has a usual change and transform in its time, place and quality (sizes)structures. The city has a solid memory diving into the past and the future and reflects The real present, and this memory has a timing layers change into real materialistic place making the city has accumulated overlapping circles which is hard to break u , and it broadcasts the lockup timing density ,in which there is no visual record precisely, it is just like((the social record)) that evaluates the un visual relationships between the components and parts of the city (community and form) in a visual quiet exhibition and transform change inside. There is no city on earth stayed as it is in its size and shape, in which both of these are in a continuous change (increase and decrease) and continuous transform. Because all cities lie on urbanization development pressures that is the population growth and become exhibited worldly especially after the Second World War. Thus, the problem lies on the defect of time and place structures of the city that reflects negatively on the quality structures (sizes). Then, the deformed change and growth of the city loses its historical storage and it imitates the growth samples out of it is contexts that can not follow it. The cities are born as an urban organization which it could be formal or communal, and it don’t stay on its size or form which it born upon them. Actually it's suffer from transformation and changing's or both of them and they are caused by the effects of time and place. As a result of these effects the city may be witness (size operation), or change its architectural properties, all this will be study in the theoretical side of the research. The research applied its theory on Baghdad city as a case study. Baghdad so that any other cities as something alive which is born, then witness transformations and changing which causing to it time and place effects, they are effect its size (increase and decrease) according to the time effect (event) that made the change or the place effect, and all above will be search in more details with a historical sequences, and in a descriptive and analytical method during the practical side of the research. For this, the research aims at checking these effects of time and place and its reflection on the quality size of city (area and population) taking the change in size of Baghdad city and its growth through the
Interleukin-38 (IL-38), an inflammatory cytokine discovered in recent years, has been implicated in the pathogenesis of systemic lupus erythematosus (SLE). IL-38 is encoded by the
This research seeks to shed light on what you add intangible assets of benefit to the company and this antagonize pause for consideration because it makes the company in a good competitive position stimulates the rest of the companies to acquire those assets.
That many companies have achieved competitive advantages in the market do not even achieved monopolies increased the value and reaped extraordinary profits as a result of those assets which requires the need to be measured to determine the extent to which contribution in the emergence of the value added to the value of the company on the one hand and to make the presentatio
... Show MoreAntibiotic resistance is the major growing threat facing the pharmacological treatment of bacterial infections. Therefore, bioprospecting the medicinal plants could provide potential sources for antimicrobial agents. Mimusops, the biggest and widely distributed plant genus of family Sapotaceae, is used in traditional medicines due to its promising pharmacological activities. This study was conducted to elucidate the antimicrobial effect of three unexplored Mimusops spp. (M. kummel, M. laurifolia and M. zeyheri). Furthermore, the mechanisms underlying such antibacterial activity were studied. The Mimusops leaf extracts revealed significant antibacterial activities against the five tested bacter
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show More