The development issue is considered as one of the most important matters of concern to governments, intellectuals and specialists in the contemporary world, especially in developing countries that are trying hard to move out of the afflicting underdevelopment domain to a brighter future and achieve the aspirations of those countries through organized planning which take advantage of available resources, whether material or humanitarian, in the best way possible.
The development process are taking place at multiple levels ranging from national to regional to local where the community is stimulated and excited for the cooperation, participation and preparation to perform planned change in the methods of thinking, acting and production.<
Despite the history of Baghdad city extends into a long history, most of the contemporary buildings of Baghdad have been shaped in the era of modernity. Furthermore, most of the buildings of modernity in Baghdad are types of modernity buildings in Iraq as a whole, and due to all the joints of change and development are taking place in Iraq starts from Baghdad. Accordingly, all selected buildings, which would be presented as case studies of modernity will be exclusively in Baghdad. Although the importance of this significant modernist product, which represents the identity of Baghdad, which should be preserved by the renewal and preservation policies, the problem of research was emerged as follow: new fin
... Show MoreBackground: Klebsiella pneumoniae were considered as normal flora of skin, and intestine. It can cause damage to human lungs; the danger of this bacterium is related to exposure to the hospital surroundings. materials and methods: the detection of Klebsiella pneumoniae on morphological and biochemical tests and then assured with VITEK 2 system. Resistance to antibiotics was determined by Kirby-Baeur method. And genotyping of IMP-1 in isolates was done by PCR technique, then biofilm formation was identified by Micro titer plate method. Results: The present study included a collecting of 50 specimens from different clinical specimens, (blood 40%, urine 30%, sputum 20%, wound infection 10%); 10 isolates were identified as K
... Show MoreAPDBN Rashid, The College of Arts/ Al-Mustansiriyya University, 2004
The study conducted on the compositions of epiphytic diatoms on three taxa of aquatic plants were selected (Phragmites australis Trin ex stand , Ceratophyllum demersum L. and Typha domengensis Pers) in three sites within Al-Auda Marsh, from autumn 2013 to summer 2014 . The study was measured physical and chemical factors of all the study sites, such as: air temperature, power of hydrogen (pH), electrical conductivity (EC), salinity (S‰), total hardness(TH), dissolved oxygen (DO), and plant nutrient. The results showed that water of marsh was oxygenated and it was very hard. A total of 111 taxa of phytoplankton were identified, which belonged to 13 families and 26 genus (one family and two genus of centric diatoms, 12 families and 26 ge
... Show MoreIn this golden age of rapid development surgeons realized that AI could contribute to healthcare in all aspects, especially in surgery. The aim of the study will incorporate the use of Convolutional Neural Network and Constrained Local Models (CNN-CLM) which can make improvement for the assessment of Laparoscopic Cholecystectomy (LC) surgery not only bring opportunities for surgery but also bring challenges on the way forward by using the edge cutting technology. The problem with the current method of surgery is the lack of safety and specific complications and problems associated with safety in each laparoscopic cholecystectomy procedure. When CLM is utilize into CNN models, it is effective at predicting time series tasks like iden
... Show MoreDue to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show MoreThe evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated
... Show MorePassive optical network (PON) is a point to multipoint, bidirectional, high rate optical network for data communication. Different standards of PONs are being implemented, first of all PON was ATM PON (APON) which evolved in Broadband PON (BPON). The two major types are Ethernet PON (EPON) and Gigabit passive optical network (GPON). PON with these different standards is called xPON. To have an efficient performance for the last two standards of PON, some important issues will considered. In our work we will integrate a network with different queuing models such M/M/1 and M/M/m model. After analyzing IPACT as a DBA scheme for this integrated network, we modulate cycle time, traffic load, throughput, utilization and overall delay
... Show More