Preferred Language
Articles
/
jpd-142
The Effect of Time and Place Dimensions on Changing the Quality Dimensions of Sizes of Cities: A Case Study (Baghdad city)
...Show More Authors

The city has normal natural state, and the man has a usual movement, change and search for the new .Also, the city has a usual change and transform in its time, place and quality (sizes)structures. The city has a solid memory diving into the past and the future and reflects The real present, and this memory has a timing layers change into real materialistic place making the city has accumulated overlapping circles which is hard to break u , and it broadcasts the lockup timing density ,in which there is no visual record precisely, it is just like((the social record)) that evaluates the un visual relationships between the components and parts of the city (community and form) in a visual quiet exhibition and transform change inside. There is no city on earth stayed as it is in its size and shape, in which both of these are in a continuous change (increase and decrease) and continuous transform. Because all cities lie on urbanization development pressures that is the population growth and become exhibited worldly especially after the Second World War. Thus, the problem lies on the defect of time and place structures of the city that reflects negatively on the quality structures (sizes). Then, the deformed change and growth of the city loses its historical storage and it imitates the growth samples out of it is contexts that can not follow it. The cities are born as an urban organization which it could be formal or communal, and it don’t stay on its size or form which it born upon them. Actually it's suffer from transformation and changing's or both of them and they are caused by the effects of time and place. As a result of these effects the city may be witness (size operation), or change its architectural properties, all this will be study in the theoretical side of the research. The research applied its theory on Baghdad city as a case study. Baghdad so that any other cities as something alive which is born, then witness transformations and changing which causing to it time and place effects, they are effect its size (increase and decrease) according to the time effect (event) that made the change or the place effect, and all above will be search in more details with a historical sequences, and in a descriptive and analytical method during the practical side of the research. For this, the research aims at checking these effects of time and place and its reflection on the quality size of city (area and population) taking the change in size of Baghdad city and its growth through the   

View Publication
Publication Date
Thu Mar 21 2024
Journal Name
Egyptian Journal Of Medical Human Genetics
Low heterozygosity for rs3811050, a 5 prime untranslated region variant of the gene encoding interleukin-38 (IL1F10), is associated with a reduced risk of systemic lupus erythematosus
...Show More Authors
Abstract<sec> <title>Background

Interleukin-38 (IL-38), an inflammatory cytokine discovered in recent years, has been implicated in the pathogenesis of systemic lupus erythematosus (SLE). IL-38 is encoded by the IL1F10 (interleukin 1 family member 10) gene. Genetic variants of this gene have been associated with susceptibility to a number of autoimmune and inflammatory diseases, while their association with SLE risk has not been explored. In this case–control study, two novel variants of the 5 prime untranslated region (5′UTR) of the IL1F10 gene, rs3811050 C/T and rs3811051 T/G, were investigated

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
the challenges of accounting measurement of intangible assets of create additional value for the company and ways to address them
...Show More Authors

   This research seeks to shed light on what you add intangible assets of benefit to the company and this antagonize pause for consideration because it makes the company in a good competitive position stimulates the rest of the companies to acquire those assets.

   That many companies have achieved competitive advantages in the market do not even achieved monopolies increased the value and reaped extraordinary profits as a result of those assets which requires the need to be measured to determine the extent to which contribution in the emergence of the value added to the value of the company on the one hand and to make the presentatio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 10 2020
Journal Name
Baghdad Science Journal
Investigation of the Biochemical and Ultrastructural Mechanisms Underlying the Antimicrobial Activity of Mimusops spp. Extracts: Antimicrobial activity of Mimusops spp.
...Show More Authors

Antibiotic resistance is the major growing threat facing the pharmacological treatment of bacterial infections. Therefore, bioprospecting the medicinal plants could provide potential sources for antimicrobial agents. Mimusops, the biggest and widely distributed plant genus of family Sapotaceae, is used in traditional medicines due to its promising pharmacological activities. This study was conducted to elucidate the antimicrobial effect of three unexplored Mimusops spp. (M. kummel, M. laurifolia and M. zeyheri). Furthermore, the mechanisms underlying such antibacterial activity were studied. The Mimusops leaf extracts revealed significant antibacterial activities against the five tested bacter

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today: Proceedings
Response surface methodology: A review on its applications and challenges in microbial cultures
...Show More Authors

View Publication
Scopus (252)
Crossref (189)
Scopus Clarivate Crossref
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (9)
Scopus Crossref