The research investigates the political effect and its directions on the architectural thoughts and its achievements and how can this political system affect all fields of life in communities including architectural urban design. The problem of the research lies in the ambiguity effects of the ideological national directions of the Nazi Party on the architecture and urban design of the city of Berlin, then determining the aims of the research to discuss the concepts of politics and architecture and their relation to the way of thinking that plays a role in the process of design that works on property and achieving the suitable urban environments for those communities. After that, the Nazi's party's thought would be studied and analyzed, its concepts, public beliefs and its relation with renewing the city of Berlin as an example, to finish with introducing the conclusions.
In data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.
To perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim
... Show MoreThis study focused on spectral clustering (SC) and three-constraint affinity matrix spectral clustering (3CAM-SC) to determine the number of clusters and the membership of the clusters of the COST 2100 channel model (C2CM) multipath dataset simultaneously. Various multipath clustering approaches solve only the number of clusters without taking into consideration the membership of clusters. The problem of giving only the number of clusters is that there is no assurance that the membership of the multipath clusters is accurate even though the number of clusters is correct. SC and 3CAM-SC aimed to solve this problem by determining the membership of the clusters. The cluster and the cluster count were then computed through the cluster-wise J
... Show MoreThe study aims at identifying the sources of information and explaining their role in e-learning from the viewpoint of the Iraqi college students. The researchers relied on the descriptive method of the survey method to collect data and know the point of view of undergraduate students from the Department of Information in the College of Arts / Tikrit University and the Department of Quranic Studies at the College of Arts / University of Baghdad. The questionnaire was used as an instrument of the study, the research sample is (120) students; each section has (60) male and female students. The study concluded that there are many types and forms of information sources that students receive through electronic educational platforms from text con
... Show MoreBackground: Poly cystic ovary syndrome is a common disorder in women of reproductive age, it is associated with disturbance of reproductive, endocrine and metabolic functions. The pathophysiology of PCOS appears to be multifactorial and polygenic. Leptin seems to play an important role in pathophysiology of PCOS especially in women with BMI ≥25kg/m2. Objectives: To assess leptin level in both PCOS and healthy women and explore the relation to their body weight and body mass index. Patient and Methods: A total of 120 women were enrolled in this study, 60 women (50%) had PCOS (study group) and the reminder 60 women (50%) were healthy women and considered as control group. BMI was calculated first. Both groups were further sub
... Show MoreE-Learning packages are content and instructional methods delivered on a computer
(whether on the Internet, or an intranet), and designed to build knowledge and skills related to
individual or organizational goals. This definition addresses: The what: Training delivered
in digital form. The how: By content and instructional methods, to help learn the content.
The why: Improve organizational performance by building job-relevant knowledge and
skills in workers.
This paper has been designed and implemented a learning package for Prolog Programming
Language. This is done by using Visual Basic.Net programming language 2010 in
conjunction with the Microsoft Office Access 2007. Also this package introduces several
fac
A medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s un
... Show MoreBackground: Dental caries is a disease occurs in the world in both developed and developing countries, it is still widespread among children and it can be controlled but not eliminated , most of tooth loss occurs due to dental caries and its complications. The aim of this study was to estimate the occurrence, and severity of dental caries and treatment needs among kindergarten children in Al-Basrah governorate. Materials and methods: The sample consisted of 1000 kindergarten children at age of 4-5 years old (445 boys and 555 girls) from urban areas in Al-Basrah city. Diagnosis and recording of dental caries and treatment needs were done according to the criteria of WHO (1987). Results: The percentage of dental caries was (80.8%) of the tota
... Show More