The integration of gender in urban studies is considered a goal and objective to build a society characterized by justice and equality. It further allows all its residents to enjoy the opportunities to live in a safe urban life. Based on the that, the limitations of the research and its field of interest related to the relationship between gender and urban studies have become clear. The insufficient knowledge in this regard considers gender as a concept that does not exist in itself, but rather overlaps and intersects with several concepts and studies, including urban studies. Thus, it has become necessary to adopt a descriptive methodology that helps reach a theoretical framework to explain the beginnings of such an interaction and integration between the two concepts. Such a step in return helps clarify the chronology of a number of conferences and their role in shedding light on gender issues focusing on the 2030 agenda. This is because such agenda is related to the near future and obligates all countries to achieve their goals where gender is one of them. Accordingly, the present work poses the question: Are gender studies and urban studies reciprocal and collaborative? The research ends with a set of conclusions, such as: the gender analysis of urban issues provides new insights and an explicit introduction to the study of gender and its effects in urban studies. They further illustrate the role of such insights on the development and prosperity of these cities to be suitable for all. The research has recommended integrating gender-sensitive planning strategies, as they represent a key factor to policy makers, urban planners, and designers in their policies, programs and decision-making processes. They also help create a sustainable and inclusive urban development.
The ligand Schiff base [(E)-3-(2-hydroxy-5-methylbenzylideneamino)- 1- phenyl-1H-pyrazol-5(4H) –one] with some metals ion as Mn(II); Co(II); Ni(II); Cu(II); Cd(II) and Hg(II) complexes have been preparation and characterized on the basic of mass spectrum for L, elemental analyses, FTIR, electronic spectral, magnetic susceptibility, molar conductivity measurement and functions thermodynamic data study (∆H°, ∆S° and ∆G°). Results of conductivity indicated that all complexes were non electrolytes. Spectroscopy and other analytical studies reveal distorted octahedral geometry for all complexes. The antibacterial activity of the ligand and preparers metal complexes was also studied against gram and negative bacteria.
This research aims to study the morphological anatomical characteristics and geographical distribution of the species Horwoodia dicksoniae (Turrill) belong to Brassicaceae family in Iraq. The results were revealed the morphological characteristics of the root, stem, leaves, fruits and seeds, abaxial surface of the leaf characterized by covered with simple hairs. The fruits were circular in shape with wide wing and have one seed. The seeds were conical shape and pustular surface configuration. The anatomical characteristics of the root, stem, and leaf were studied and the cross-section of the root was characterized by thick periderm layer and cortex layer consisting primarily of parenchyma cells, stem cross section was characterize
... Show MoreThe design of coordination compounds with solvent-responsive optical properties remains a central challenge in molecular photonics. Here, we describe the synthesis and full characterisation of a symmetrical tetradentate diamine ligand, 3,3′-((1,2-phenylenebis(azanediyl))- bis(methanylylidene))bis(pentane-2,4-dione) (H₂L), and its neutral square-planar complexes [M(L)] (M(II) = Co, Ni, Cu). The Cu(II) complex crystallised as [Cu(L)]⋅0.5 (pyrazine), adopting a nearly square-planar geometry (τ₄ = 0.06) in the solid state, as confirmed by single-crystal X-ray diffraction. In DMSO solution, UV–Vis spectra revealed reversible axial coordination of two solvent molecules, driving a transformation to a distorted octahedral geometry. Struc
... Show MoreBACKGROUND: Montelukast (Singulair) is a cysteinyl leukotriene receptor antagonist, used for the maintenance treatment of asthma and to relieve symptoms of seasonal allergic rhinitis and asthma, also used for exercise-induced bronchospasm. AIM: This study was performed to determine the prevalence of Montelukast use as an add-on therapy among Iraqi asthmatic patients on treatment. Comparing the effectiveness of regimens with and without montelukast. METHODS: This descriptive cross-sectional study was carried out on 73 Iraqi asthmatic patients on treatment of both sexes with age range (18-60) years old, attending Al-Kindy Teaching Hospital and Al-Zahraa Centre of Asthma and Allergy, Baghdad, for the period between February
... Show MoreBACKGROUND: Montelukast (Singulair) is a cysteinyl leukotriene receptor antagonist, used for the maintenance treatment of asthma and to relieve symptoms of seasonal allergic rhinitis and asthma, also used for exercise-induced bronchospasm. AIM: This study was performed to determine the prevalence of Montelukast use as an add-on therapy among Iraqi asthmatic patients on treatment. Comparing the effectiveness of regimens with and without montelukast. METHODS: This descriptive cross-sectional study was carried out on 73 Iraqi asthmatic patients on treatment of both sexes with age range (18-60) years old, attending Al-Kindy Teaching Hospital and Al-Zahraa Centre of Asthma and Allergy, Baghdad, for the period between February
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreIn architectural learning, it is difficult to stimulate cultural awareness through the traditional education approaches, which results in historic places being neglected as knowledge sources. This research explores the premise that sketch-based visual storytelling may act as a generative approach to connect cognition, emotion, and behavior in historical contexts. The study adopts a qualitative methodology to explore a learning experience comprising two phases: the first is a formal educational setting, and the second is a historical and cultural context, aiming to investigate the role of sketch-based storytelling in enhancing cultural awareness. MAXQDA was employed to code the students’ storyboards on three levels of cultural awareness, m
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More