The historical center cities were exposed to change, which included its social and economical structures, Which led to sweeping changes in land use, causing a change in the result, in urban fabric and the physical structure and therefore to see visual. We have attracted these centers as a result of pressure from urban development and contemporary reflection of the agents of change which have been hit during the late period a development residential newly not sympathize mostly with the content of the historical and at the expense of removing large parts of the urban fabric and replace it with patterns of structural and styles of architecture has not been connected with reality. Which led to the loss of some historical and architectural features that have characterized these centers. Thus, the associated problem of search by selecting the "ground that led to changes in those centers, which came to meet the requirements of present and future have changed land-use and affect in determining the configurations of urban multiple centers ". The research aims to "statement of the potential of the configuration of urban historic centers of cities and to identify the factors that led to change the architectural character and historical identity and signaling transformation and change, which gets started in the traditional core functions and uses of the land and diagnosis resulting from the change of the composition of visual effects hit and installation of urban. " The research approach adopted was associated with levels of finds, including a link development in city centers to take practical steps were the possibility of re-lines and spaces of the traditional city center with the positioning of the economic attractions
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreSynthesis and preliminary biological evaluation of imidazo (2, 1-b) Thiazole derivatives is reported. Under Mannich conditions, a series of new imidazo (2, 1-b) Thiazole derivatives were synthesized. Starting from the reaction of 2- amino thiazole with 4- bromo phenyl bromide to produce 5-(4-bromo phenyl) imidazo (2, 1-b) thiazoles, following by introduce the substituted aminomethyl at position 6-by reacting with different aromatic amines under Mannich conditions to afford 6-secondary amine-5-(4-bromo phenyl) imidazo (2,1-b) thiazole in high yields.
FT-IR, 1H NMR, and 13C NMR techniques were used to characterize the synthesized derivatives. In addition, all compounds were tested for their antioxidant activity, and thr
... Show MoreThis work discusses the beginning of fractional calculus and how the Sumudu and Elzaki transforms are applied to fractional derivatives. This approach combines a double Sumudu-Elzaki transform strategy to discover analytic solutions to space-time fractional partial differential equations in Mittag-Leffler functions subject to initial and boundary conditions. Where this method gets closer and closer to the correct answer, and the technique's efficacy is demonstrated using numerical examples performed with Matlab R2015a.
The theories and applications of speaker identification, recognition, and verification are among the well-established fields. Many publications and advances in the relevant products are still emerging. In this paper, research-related publications of the past 25 years (from 1996 to 2020) were studied and analysed. Our main focus was on speaker identification, speaker recognition, and speaker verification. The study was carried out using the Science Direct databases. Several references, such as review articles, research articles, encyclopaedia, book chapters, conference abstracts, and others, were categorized and investigated. Summary of these kinds of literature is presented in this paper, together with statistical analyses
... Show MoreThis study included partial purification of the lipase enzyme from the karnel of the pecan nut. After applying ion exchange chromatography technique using CM-Cellulose, two lipase isoenzymes were observed with specific activity values of 2.66 and 1.7 units/mg protein. The highest activity of both isoenzymes appeared at the optimum pH values of 8 and 6 and at temperatures of 40 and 50 °C, respectively. A pure single band was obtained by using electrophoresis technique and it was found that the approximate molecular weight was 42 kDa for the two isoenzymes. The study dealt with the preparation of the diester compound 1,4-diacetoxybenzene, which was diagnosed by GC-MS and 1H NMR spectrometry. When studying the inhibitio
... Show MoreA series of 4-(methylsulfonyl)aniline derivatives were synthesized in order to obtain new compounds as a potential anti-inflammatory agents with expected selectivity against COX-2 enzyme. In vivo acute anti-inflammatory activity of the final compounds 11–14 was evaluated in rat using an egg-white induced edema model of inflammation in a dose equivalent to 3 mg/Kg of diclofenac sodium. All tested compounds produced significant reduction of paw edema with respect to the effect of propylene glycol 50% v/v (control group). Moreover, the activity of compounds 11 and 14 was significantly higher than that of diclofenac sodium (at 3 mg/Kg) in the 120–300 minute time interval, while compound 12 expressed a comparable effect to that of di
... Show More