The city has normal natural state, and the man has a usual movement, change and search for the new .Also, the city has a usual change and transform in its time, place and quality (sizes)structures. The city has a solid memory diving into the past and the future and reflects The real present, and this memory has a timing layers change into real materialistic place making the city has accumulated overlapping circles which is hard to break u , and it broadcasts the lockup timing density ,in which there is no visual record precisely, it is just like((the social record)) that evaluates the un visual relationships between the components and parts of the city (community and form) in a visual quiet exhibition and transform change inside. There is no city on earth stayed as it is in its size and shape, in which both of these are in a continuous change (increase and decrease) and continuous transform. Because all cities lie on urbanization development pressures that is the population growth and become exhibited worldly especially after the Second World War. Thus, the problem lies on the defect of time and place structures of the city that reflects negatively on the quality structures (sizes). Then, the deformed change and growth of the city loses its historical storage and it imitates the growth samples out of it is contexts that can not follow it. The cities are born as an urban organization which it could be formal or communal, and it don’t stay on its size or form which it born upon them. Actually it's suffer from transformation and changing's or both of them and they are caused by the effects of time and place. As a result of these effects the city may be witness (size operation), or change its architectural properties, all this will be study in the theoretical side of the research. The research applied its theory on Baghdad city as a case study. Baghdad so that any other cities as something alive which is born, then witness transformations and changing which causing to it time and place effects, they are effect its size (increase and decrease) according to the time effect (event) that made the change or the place effect, and all above will be search in more details with a historical sequences, and in a descriptive and analytical method during the practical side of the research. For this, the research aims at checking these effects of time and place and its reflection on the quality size of city (area and population) taking the change in size of Baghdad city and its growth through the
In the present work polymer electrolytes were formulated using the solvent casting technique. Under special conditions, the electrolyte content was of fixed ratio of polyvinylpyrolidone (PVP): polyacrylonitrile (PAN) (25:75), ethylene carbonate (EC) and propylene carbonate (PC) (1:1) with 10% of potassium iodide (KI) and iodine I2 = 10% by weight of KI. The conductivity was increased with the addition of ZnO nanoparticles. It is also increased with the temperature increase within the range (293 to 343 K). The conductivity reaches maximum value of about (0.0296 S.cm-1) with (0.25 g) ZnO. The results of FTIR for blend electrolytes indicated a significant degree of interaction between the polymer blend (PVP and PAN)
... Show MoreWith the narratives and sayings in the biography of the Prophet and the science of the Koran, Orientalists used this case as a pretext to distort the biography of the Prophet and his character and patience for his call. Researcher in the folds of his research.
The work include synthesis of nanocomposites (X / S / Ag) based on blend from Xanthan gum / sodium alginate polymers (X / S) with different loading of synthesized silver nanoparticales (0.01, 0.03 and 0.05 wt%) were added to the blend. The silver nanoparticles were prepared by reduction method and were characterized and analyzed using X-ray diffraction (XRD) and Atomic force microscope (AFM). XRD study showed the presence nanoparticle of silver with crystalline nature and face-centered cubic (FCC) structure and an average size of nanoparticles ranging from 32 to 37 nm. The surface study was performed using AFM which showed a fairly uniform shape to the nanocomposites and a spherical nature for the silver nanoparticles. The nanocomposite exh
... Show MoreCo-composting process can be acquired by combining organic fraction of municipal solid waste (OFMSW) with sewage sludge (SS) and mature compost (MC) as enhancement and bulking agent to overcome the problems of municipal solid waste and wastewater treatment plants besides the finally produced fertilizer usage for agriculture and horticulture. The effects of different mixture ratios of (OFMSW), (SS) and (MC) on the performance of composting process were investigated in this study. Piles of about 10 kg were prepared by mixing OFMSW, SS and MC in three different ratios (w/w) [OFMSW: SS: MC= 3:1:1, 3:2:1, and 3:3:1]. Results showed that the pile [3:1:1] was most beneficial to composting. The final compost products contained a
... Show MoreIt is often needed to have circuits that can display the decimal representation of a binary number and specifically in this paper on a 7-segment display. In this paper a circuit that can display the decimal equivalent of an n-bit binary number is designed and it’s behavior is described using Verilog Hardware Descriptive Language (HDL). This HDL program is then used to configure an FPGA to implement the designed circuit.
Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show More