Preferred Language
Articles
/
jpd-250
The "actor network theory" approach in dealing with landscapes in historical centers
...Show More Authors

The historical center's landscape suffers from neglect, despite their importance and broad capabilities in enhancing the cultural value of the historical center, as landscape includes many heterogeneous human and non-human components, material and immaterial, natural and manufactured, also different historical layers, ancient, modern and contemporary. Due to the difference in these components and layers, it has become difficult for the designer to deal with it. Therefore, the research was directed by following a methodology of actor-network theory as it deals with such a complex system and concerned with an advanced method to connect the various components of considering landscape as a ground that can include various elements and deal with them to produce all homogenized to enhance the value of the historic center.  

         The research problem represented by the lack of a comprehensive presentation of the effective network theory approach in dealing with landscapes, so the goal of the research became, to build a comprehensive framework for the effective network theory approach in dealing with the historical center landscape, which is represented by two components, actors and the concept of networking actors.

           Finally, the research has taken the landscape of AlQushla building to illustrate how the actors and the concept of networking actors was been achieved, and who they worked to enhance the cultural value of the historical center.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 28 2017
Journal Name
Al-khwarizmi Engineering Journal
Aircraft Lateral-Directional Stability in Critical Cases via Lyapunov Exponent Criterion
...Show More Authors

Based on Lyapunov exponent criterion, the aircraft lateral-directional stability during critical flight cases is presented. A periodic motion or limit cycle oscillation isdisplayed. A candidate mechanism for the wing rock limit cycle is the inertia coupling between an unstable lateral-directional (Dutch roll) mode with stable longitudinal (short period) mode. The coupling mechanism is provided by the nonlinear interaction of motion related terms in the complete set equations of motion. To analyze the state variables of the system, the complete set of nonlinear equations of motion at different high angles of attack are solved. A novel analysis including the variation of roll angle as a function of angle of attack is proposed. Furthermore

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
The effect of innovation and modernization as an approach to strategic change in the efficiency of organizational performance Field research in the Oil Projects Company (SCOP(
...Show More Authors

 

The purpose of this research is to improve the organizational performance of the Oil Projects Company by adopting an approach to strategic change، and finding appropriate solutions to the problems facing the company. The researcher adopted in designing his research by conducting a survey of previous literature that dealt with approaches to strategic change، as the results of the survey showed that most researchers agree on the approach of renewal and modernization، Which formed a starting point for the researcher to identify the extent of the company's management interest in renewal and modernization to improve its level of performance، and the quality of the procedures followed on the ground that is related to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Baghdad Science Journal
The Gumbel- Pareto Distribution: Theory and Applications
...Show More Authors

In this paper, for the first time we introduce a new four-parameter model called the Gumbel- Pareto distribution by using the T-X method. We obtain some of its mathematical properties. Some structural properties of the new distribution are studied. The method of maximum likelihood is used for estimating the model parameters. Numerical illustration and an application to a real data set are given to show the flexibility and potentiality of the new model.

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Oct 18 2023
Journal Name
Ieee Access
A New Imputation Technique Based a Multi-Spike Neural Network to Handle Missing Data in the Internet of Things Network (IoT)
...Show More Authors

View Publication
Scopus (8)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Phenol Content and Peroxidase Enzyme Activity in Soybean Infected with Xanthomonas axonopodis pv glycines with the Application of Bacillus subtilis JB12 and Bacillus velezensis ST32
...Show More Authors

Xanthomonas axonopodis pv glycines (Xag) is a pathogen that causes pustule disease in soybeans. Many
techniques for controlling this disease have been widely developed, one of which is the use of biological agents.
Bacillus sp. from the soybean phyllosphere is a biological agent that has the potential to suppress the
development of pustule disease. One of the biological control mechanisms is through biochemical induction
of plant resistance which includes the accumulation of phenols, salicylic acid compounds, and peroxidase
enzymes. Bacillus subtilis JB12 and Bacillus velezensis ST32 are two bacteria isolated from the soybean
phyllosphere which have previously been known to suppress Xag through an anti

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Deposit insurance system and its role in financial security for the period (2010-2018) Study the experiences of Selected countries with reference to Iraq
...Show More Authors

Founding a System to secure deposits and protecting the depositors is considered one of the important and exchanged subjects out there in the banking system/field in Iraq at the current time, and the reason behind the exchange and spread of this subject is due to the financial crisis of which the banking sector is suffering from and the stumbling of many banks, those factors have had led to the insecurity of the depositors and their mistrust towards banks, thus, it is necessary to create a system to secure deposits in which depositors would be compensated for the losses caused by the banks' failures. in addition, it could be a countermeasure system which maintains the banking stability, protects the rights of depositors and gains

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jan 02 2018
Journal Name
Journal Of Educational And Psychological Researches
The effectiveness of educational design design according to the theory of Ozbal in the acquisition of geographical concepts among the pupils of the fourth primary in the geography and development of their habits of mind
...Show More Authors

Summary The objective of the research is to learn the design of a learning educational learning according to the theory of Ausubel in the acquisition of geographical concepts among the students of the fourth primary in the field of geography and the development of their habits of mind. To achieve this, the researcher relied on the two hypotheses the researcher used the design of equal groups the first experimental group was studied according to the design educational educational learning according to the theory and the other is an officer according to the traditional method. The research community consists of fourth grade pupils in primary school day for girls in the Directorate of Education Baghdad, Al-Rusafa, the third academic year 20

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 19 2024
Journal Name
Ieee Explorer
A Novel Flow Priority and Continuity Control Mechanism in SDN Network
...Show More Authors

In recent days, the escalating need to seamlessly transfer data traffic without discontinuities across the Internet network has exerted immense pressure on the capacity of these networks. Consequently, this surge in demand has resulted in the disruption of traffic flow continuity. Despite the emergence of intelligent networking technologies such as software-defined networking, network cloudification, and network function virtualization, they still need to improve their performance. Our proposal provides a novel solution to tackle traffic flow continuity by controlling the selected packet header bits (Differentiated Services Code Point (DSCP)) that govern the traffic flow priority. By setting the DSCP bits, we can determine the appropriate p

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Sep 15 2020
Journal Name
Al-academy
The Philosophy of Beauty and Aesthetic Tasting in the Story of Yusuf, peace be upon him, with the Al-Azeez’s Wife in light of the sayings of Ancient Philosophers and Modernists: نزار بن صالح أحمد عبد الحفيظ
...Show More Authors

This study aimed to review the aesthetic miracle in the story of Yusuf, peace be upon him, with the Al-Azeez’s wife, using the historical, descriptive and analytical approaches. The study sample was determined in the verses (30-34) of the Holy Quran. The study found that the beauty of Yusuf, peace be upon him, went beyond the four stages and steps of the aesthetic judgment that Feldman set, in which Yusuf’s beauty is nothing but a divine miracle that cannot be described, analyzed, and interpreted. Also despite the various concepts of beauty dealt with by ancient Greek philosophers such as the Pythagoreans, Socrates, Plato and Aristotle; and modern philosophers such as Descartes, Diderot, Kant, Hegel, and Schopenhauer are embodied in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref