Preferred Language
Articles
/
joe-381
Values and technology in architecture - the impact and vulnerability
...Show More Authors

Technology is an important factor for achieving architecture as an impact and vulnerability. It represents one of the significant elements in creating the intellectual framework, as well as having its own intellectual breakdown, while values constitute the most important and obviously factor of the community's intellectual. Research aims was determined accordingly by: investigating the role and impact of values and their relationship to technology in architecture.

In this context, the research investigated values and technology in architecture, through discussing their aspects and dimensions in architecture. In the context of values, the research discussed their concept and the related ones to have a concrete definition, and discussed manifestations in terms intellectual and social system represented by value's judgment and value's system, that  creating the most important factor for the differentiation communities, which were leading to the study of values in architecture. In this context, the research identifies trends of values in architecture to determine and adopt the private values-oriented in architecture.

In the other hand, the research discussed the concept of technology, its impact on the architecture through dealing with architectural technology and its dimensions according to the context.  A focus was made on the intellectual dimension, which lies under the physical aspect of the technology. Then a convergence technology utilization and the expressive aspects was made within an input and output of architectural practice which implemented on selected projects. A set of conclusions was achieved regarding the theoretical research framework and the case study as well.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
North and north-eastern wind and its impact on the racial temperature and humidity in Iraq
...Show More Authors

The study area is witnessing divergence where I am North wind North East wind as we find that the north wind is getting replicated as we move from the south, The reason can be attributed to the nature of the surface of the region, with at least repeat this wind the northern region to the presence of mountain ranges, while we find that energizes the surface in the center and south helped to increase repeat this wind gusts, It also finds that the North wind East prevail in the northern region and least replicated as we move from the north to the south and to the fact that North stations are within blowing this wind sites for the circles near the display of high pressure located centers to the north-east, north and distancing itself from pa

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 14 2026
Journal Name
Al–bahith Al–a'alami
The extent of Concern of the University Press in Students’ Issues (Journal of the University of Technology as a Model) for the Period from 2009 to 2012
...Show More Authors

The university press is an essential pillar in building an academic community to achieve its objectives in the service of society. Since the university press is a means of university media, which is issued by the departments or units of media in Iraqi universities as academic governmental-institutions, so it highlights the activities of the university and link them to its internal society in the first place as the university press is a mirror of the university and its voice is sincerely expressed. This research comes to know the extent of interest of the university press in various student issues.

In order to identify the problem of the research, the method of content analysis was adopted within the survey method

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 19 2019
Journal Name
Engineering, Construction And Architectural Management
Influential safety technology adoption predictors in construction
...Show More Authors
Purpose

Existing literature suggests that construction worker safety could be optimized using emerging technologies. However, the application of safety technologies in the construction industry is limited. One reason for the constrained adoption of safety technologies is the lack of empirical information for mitigating the risk of a failed adoption. The purpose of this paper is to fill the research gap through identifying key factors that predict successful adoption of safety technologies.

Design/methodology/approach

In total, 26 key technology adoption predictors

... Show More
View Publication
Scopus (66)
Crossref (66)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Managing risk and its impact in the face of accidents and work injuries in industrial organizations
...Show More Authors

The industrial sector of the important drivers of economic activity sectors due to having the capabilities and the potential to qualify biggest contribution to the economic development of the country, which requires the availability of a higher degree of safety in industrial organizations, and the preservation of the lives of employees and workers in emergency situations, and that all the work is not without its dangers, which produces in a year of uncertainty in the possible events get in the future, therefore, reduce the dangers that could be exposed to industrial organizations and management are at the heart of the strategic direction which works to stimulate thinking about the future and respond to the changes that occur in theextern

... Show More
View Publication
Crossref
Publication Date
Sun Sep 01 2013
Journal Name
International Journal Of Computer Applications
Concise Architecture of a Remote Network based Controller
...Show More Authors

The development of microcontroller is used in monitoring and data acquisition recently. This development has born various architectures for spreading and interfacing the microcontroller in network environment. Some of existing architecture suffers from redundant in resources, extra processing, high cost and delay in response. This paper presents flexible concise architecture for building distributed microcontroller networked system. The system consists of only one server, works through the internet, and a set of microcontrollers distributed in different sites. Each microcontroller is connected through the Ethernet to the internet. In this system the client requesting data from certain side is accomplished through just one server that is in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 13 2022
Journal Name
Lecture Notes In Networks And Systems
Single-Bit Architecture for Low Power IoT Applications
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
AlexNet Convolutional Neural Network Architecture with Cosine and Hamming Similarity/Distance Measures for Fingerprint Biometric Matching
...Show More Authors

In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
Rashid Street and its impact in the political twenties of the last century
...Show More Authors

Rasheed Street has had great importance by the nature of what was seen as being of vital events of a key facility in the Iraqi capital Baghdad since ancient times until now .
And such as cultural and historical memory-rich street for Iraq, pulsating nerve since the beginning of the last century thanks to the commercial and intellectual stature, as well as being a tourist landmark frequented alleys most of the tourists coming to Iraq , which counted for them a source of tourist attraction, given the religious diversity of fungal who excelled by the street, as we find in exchange for his Church of the Virgin Mary, the time which was built in the middle of the Caliphs Mosque towering minarets and promised that the oldest and largest of t

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 31 2020
Journal Name
College Of Islamic Sciences
: Islamic law; perfection The rule of perfection in Islamic law and its impact on the creative construction of the individual and society: The rule of perfection in Islamic law and its impact on the creative construction of the individual and society
...Show More Authors

This research explains to us the role of the Islamic religion in the issue of accuracy in speech and work, and how it is closely related to human production in his life, and Islam affirms that his idea is mainly reflected in his production, and how it affects the perception of the meaning of creativity. Therefore, our Islam affirmed the accuracy in every word or work we do to build a society in which people enjoy high quality in ethics and dedication in their work so that the Islamic system depends on humanity to preserve our rights on the other hand the research discusses the deliberate default and how it reflects on our production and how it makes it less good.

View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
Communications And Network
Link and Cost Optimization of FTTH Network Implementation through GPON Technology
...Show More Authors

View Publication Preview PDF
Crossref (4)
Crossref