Preferred Language
Articles
/
jpd-271
Architectural void is a revolution in the formation of the facades of digital architecture
...Show More Authors

Architecture has evolved through the ages as forms, relationships, materials and mechanisms according to the data of each era and up to the era of digital technology, where the change in proportions and aesthetic dimensions of contemporary architectural formation due to the capabilities of digitization has created innovative plastic properties using the void formation in the facades and the introduction of void as a formative and aesthetic element, which led to The emergence of new creative concepts and ideas that contradict traditional ideas and are consistent with the spirit of the times, led to a revolution in the world of architectural form at the level of (architectural ideas and the generation of shapes, materials and construction systems used), as a result of which new and innovative rules emerged to find the architectural form at the level of design and implementation to achieve the goals of the shape Creativity, such as regeneration and exclusivity, through discovering the formalities inherent in both mass and void, in pursuit of change and formal renewal and the appropriate effect on the recipient’s emotion. Digital Vacuum Modulation Rules).

 

 The aim of the research was to uncover the effect of the use of architectural void as a formative element in the interfaces of contemporary digital architecture on the rules of digital void formation and to reveal the

 

 

characteristics and characteristics of the achieved void construction. Fine and the nature of the products generated from it and the author of the main

 

          vocabulary (factors affecting the formation of void, the characteristics of digital void creation, the rules of digital void formation), and its application to contemporary global, Arab and local architectural models on a qualitative scale aimed at knowing the effect of vocabulary on the selected samples and the percentage of their effectiveness in the properties of digital creation And to verify the main research hypothesis, which stipulated the possibility of generating a digital spatial model with contemporary characteristics by adopting integration in all elements and standards of digital design and implementation, as it is not possible to design and create digital spaces spatially using traditional methods, and vice versa, that is, it is not possible to implement digital spatial creation which is designed in ways Traditional obstetrics, and the conclusions showed that additional rules for architectural formation other than production emerged J appeared in the era of the industrial revolution that led to the breaking of traditional rules such as proportions, stereotypes and functionalities and the liberation of architectural formation from the rule of simple forms, standardization at the expense of multiplicity and diversity in formation will not be an imperative, and the emergence of new rules of formation called (digital formation rules).

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Iraqi Journal Of Physics
Study of matter density distributions, elastic charge form factors and size radii for halo 11Be, 19C and 11Li nuclei
...Show More Authors

In this work, the calculation of matter density distributions, elastic charge form factors and size radii for halo 11Be, 19C and 11Li nuclei are calculated. Each nuclide under study are divided into two parts; one for core part and the second for halo part. The core part are studied using harmonic-oscillator radial wave functions, while the halo part are studied using the radial wave functions of Woods-Saxon potential. A very good agreement are obtained with experimental data for matter density distributions and available size radii. Besides, the quadrupole moment for 11Li are generated.

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Jan 17 2018
Journal Name
Journal Of Applied Chemistry
Synthesis, Composition, Spectral, Geometryand AntibacterialApplicationsof MnII, NiII, CoII, CuII and HgIIcomplexes of N2O2-mixed donor Schiff Basewith 1,10-phenanthroline
...Show More Authors

Preview PDF
Publication Date
Fri Aug 20 2021
Journal Name
Open Access Macedonian Journal Of Medical Sciences
Autogenous Onlay Graft with Compression Plate for Treatment of Persistent Humeral Shaft Aseptic Non-union with Failed Previous Surgery
...Show More Authors

BACKGROUND: The humeral shaft fractures have a good rate of union, despite this fact, still there is a significant rate of nonunion after nonoperative treatment and more often after operative treatment. AIM: The aim of the study is to evaluate the autogenous onlay graft with compression plate for treatment of persistent humeral shaft non-union with failed previous surgery both radiological and functional outcome. MATERIALS AND METHODS: A prospective study on twenty patients having persistent aseptic non-union age between 20 and 60 years old, after failed surgical treatment of fractures humeral shaft in Al-Zahra teaching and Al-Kindy teaching hospitals, while infected nonunion, diabetes mellitus, secondary metastasis, smoking, a

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Nov 30 2020
Journal Name
Iraqi Geological Journal
EXPERIMENTAL STUDY OF MICRO SILICA BEHAVIOR AND ITS EFFECT ON IRAQI CEMENT PERFORMANCE BY USING X-RAY FLUORESCENCE ANALYSIS
...Show More Authors

The cement slurry is a mixture of cement, water and additives which is established at the surface for injecting inside hole. The compressive strength is considered the most important properties of slurry for testing the slurry reliability and is the ability of slurry to resist deformation and formation fluids. Compressive strength is governed by the sort of raw materials that include additives, cement structure, and exposure circumstances. In this work, we use micro silica like pozzolanic materials. Silica fume is very fine noncrystalline substantial. Silica fume can be utilized like material for supplemental cementations for increasing the compressive strength and durability of cement. Silica fume has very fine particles size less

... Show More
View Publication
Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Extraction and estimation of curcumin compounds from turmeric (Curcuma longa) rhizomes by using different variables (solvent, time and temperature).
...Show More Authors

The study aimed to investigate the effect of different times as follows 0.5, 1.00, 2.00 and 3.00 hrs, type of solvent (acetone, methanol and ethanol) and temperature (~ 25 and 50)ºc on curcumin percentage yield from turmeric rhizomes. The results showed significant differences (p? 0.05) in all variables. The curcumin content which were determined spectrophotometrically ranged between (0.55-2.90) %. The maximum yield was obtained when temperature, time and solvent were 50ºC, 3 hrs and acetone, respectively.

View Publication Preview PDF
Crossref
Publication Date
Fri Nov 29 2019
Journal Name
Iraqi Journal Of Physics
CDD Study of Charge Density Distributions and Elastic Electron Scattering Cross Sections for some Stable Nuclei: Charge Density Distributions
...Show More Authors

paper

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Engineering
Upgrading of Alum Preparation and Dosing Unit for Sharq Dijla Water Treatment Plant by Using Programmable Logic Controller System
...Show More Authors

One of the important units in Sharq Dijla Water Treatment Plant (WTP) first and second extensions are the alum solution preparation and dosing unit. The existing operation of this unit accomplished manually starting from unloading the powder alum in the preparation basin and ending by controlling the alum dosage addition through the dosing pumps to the flash mix chambers. Because of the modern trend of monitoring and control the automatic operation of WTPs due to the great benefits that could be gain from optimum equipment operation, reducing the operating costs and human errors. This study deals with how to transform the conventional operation to an automatic monitoring and controlling system depending on a Programmable

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 16 2020
Journal Name
Frontiers In Pharmacology
Administration of Δ9‐Tetrahydrocannabinol (THC) Post‐Staphylococcal Enterotoxin B Exposure Protects Mice From Acute Respiratory Distress Syndrome and Toxicity
...Show More Authors

View Publication Preview PDF
Scopus (29)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Thu Feb 06 2020
Journal Name
Scientific Reports
Waste foundry sand/MgFe-layered double hydroxides composite material for efficient removal of Congo red dye from aqueous solution
...Show More Authors
Abstract<p>We aimed to obtain magnesium/iron (Mg/Fe)-layered double hydroxides (LDHs) nanoparticles-immobilized on waste foundry sand-a byproduct of the metal casting industry. XRD and FT-IR tests were applied to characterize the prepared sorbent. The results revealed that a new peak reflected LDHs nanoparticles. In addition, SEM-EDS mapping confirmed that the coating process was appropriate. Sorption tests for the interaction of this sorbent with an aqueous solution contaminated with Congo red dye revealed the efficacy of this material where the maximum adsorption capacity reached approximately 9127.08 mg/g. The pseudo-first-order and pseudo-second-order kinetic models helped to describe the sorption measure</p> ... Show More
Scopus (186)
Crossref (123)
Scopus Clarivate Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (19)
Crossref (11)
Scopus Crossref