Preferred Language
Articles
/
kRcU0Y0BVTCNdQwC6h2j
Neuromorphic Architecture for the Hierarchical Temporal Memory
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Mar 31 2018
Journal Name
Journal Of Engineering
Alliteration strategy In Contemporary Architecture
...Show More Authors

The contemporary ideas were characterized by the abundance and diversity of their knowledge, human and conceptual production, the strategy is both a general and a detailed framework covering all design disciplines both inside and outside the field of architecture. From here, many of these terraces emerged from fields outside the field of architecture, but soon moved to form an important nerve within the field of architecture. Hence the need to define a more comprehensive framework for studying one of the concepts that can frame the framework, namely the concept of "Alliteration", and its adoption as an architectural design strategy aimed at giving the resulting form a feature of rhetoric. So the research highlighted the

... Show More
View Publication
Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Containerized Event-Driven Microservice Architecture
...Show More Authors

Microservice architecture offers many advantages, especially for business applications, due to its flexibility, expandability, and loosely coupled structure for ease of maintenance. However, there are several disadvantages that stem from the features of microservices, such as the fact that microservices are independent in nature can hinder meaningful communication and make data synchronization more challenging. This paper addresses the issues by proposing a containerized microservices in an asynchronous event-driven architecture. This architecture encloses microservices in containers and implements an event manager to keep track of all the events in an event log to reduce errors in the application. Experiment results show a decline in re

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Engineering
Values and technology in architecture - the impact and vulnerability
...Show More Authors

Technology is an important factor for achieving architecture as an impact and vulnerability. It represents one of the significant elements in creating the intellectual framework, as well as having its own intellectual breakdown, while values constitute the most important and obviously factor of the community's intellectual. Research aims was determined accordingly by: investigating the role and impact of values and their relationship to technology in architecture.

In this context, the research investigated values and technology in architecture, through discussing their aspects and dimensions in architecture. In the context of values, the research discussed their concept and the related ones to have a concrete def

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 15 2023
Journal Name
Al-academy
Modern trends in the architecture of mosques in Jordan
...Show More Authors

This study analyzes the features of historical and modern mosques in Jordan compared to that of Amman. The architecture of the Jordanian mosques reflects the images of great ancient empires and kingdoms of Europe and the Middle East. This has happened due to the geographical position of the country. From the studies of historians and archaeologists, comparative analysis of planning solutions, the use of plastics and decor of the facades of mosques, and the literature on the construction methods of the mosques allow us to conclude that age-old traditions have been preserved through the establishment of mosques in both the countries. Besides, the emergence of new features in constructing mosques has been observed. We find the influence of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
A Note on the Hierarchical Model and Power Prior Distribution in Bayesian Quantile Regression
...Show More Authors

  In this paper, we investigate the connection between the hierarchical models and the power prior distribution in quantile regression (QReg). Under specific quantile, we develop an expression for the power parameter ( ) to calibrate the power prior distribution for quantile regression to a corresponding hierarchical model. In addition, we estimate the relation between the  and the quantile level via hierarchical model. Our proposed methodology is illustrated with real data example.

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Computer aided photographic memory enhancement and speed reading (case study)
...Show More Authors

This work aimed to design and testing of a computer program – based eyeQ improvement, photographic memory enhancement, and speed reading to match the reading speed 150 – 250 word per minute (WPM) with the mind ability of processing and eye snap shooting 5000WPM . The package designed based on Visual Basic 6. The efficiency of the designed program was tested on a 10 persons with different levels of education and ages and the results show an increase in their reading speed of approximately 25% in the first month of training with noticeable enhancement in the memory as well as an increase in the ability to read for longer time without feeling nerves or boring, a nonlinear continuously increase in reading speed is assured after the first mo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 26 2020
Journal Name
International Journal Of Research In Social Sciences And Humanities
THE CORRELATION BETWEEN IRAQI EFL UNIVERSITY STUDENTS WORKING MEMORY CAPACITY AND THEIR LANGUAGE PROFICIENCY
...Show More Authors

View Publication
Crossref
Publication Date
Wed May 10 2023
Journal Name
Journal Of Planner And Development
The role of historical memory on social and Cultural mobility of Hilla Old city
...Show More Authors

As long as the place in which a person lives has a meaning and temporal dimensions , memory is the main axis of these dimensions , today , city centers and old historical sectors of cities are abandoned , and began to turn into slums , the contradiction between old and historical sectors led cities to lose their identity while people lost their sense of belongingness to the old sectors where their ancestors used to live . The old city of Hilla used to have social , historical and cultural role on determining the identity . The study problem can be summarized as the ( lack of studies regarding the impact of historical memory related to Hilla old city on social and cultural mobility ) , the study hypothesis claims that the social , histori

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Split and Merge Regions of Satellite Images using the Non-Hierarchical Algorithm of Cluster Analysis
...Show More Authors

يعد التقطيع الصوري من الاهداف الرئيسة والضرورية في المعالجات الصورية للصور الرقمية، فهو يسعى الى تجزئة الصور المدروسة الى مناطق متعددة اكثر نفعاً تلخص فيها المناطق ذات الافادة لصور الاقمار الصناعية، وهي صور متعددة الاطياف ومجهزة من الاقمار الصناعية باستخدام مبدأ الاستشعار عن بعد والذي اصبح من المفاهيم المهمة التي تُعتمد تطبيقاته في اغلب ضروريات الحياة اليومية، وخاصة بعد التطورات المتسارعة التي شهد

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref