The Research deals with the negative phenomena which appeared in the urban scenes of the Iraqi cities after 2003, particularly trespassing the architectural design of the urban Individual houses. Many academic researchers , critics, and cultural circles, drawn attention to the impact of political and cultural variable change on such phenomena without detailed analysis . The research problem is set according to central questions : If the phenomena is the trespass , what
are the sides which are being trespassed in the division of the individual house? , If the diagnosis of the phenomena denotes perceived repetition of the cases , So what's size of this transposes on the architectural design of the individual house? , and what are its connections socially and economically ? The research problem diagnosis by: The lack of knowledge about the impact of the phenomena of trespassing on the architectural design of the individual house specifically?.
The research target is to explain the range of the spreading of trespass in these houses with objective , social , economical investigation, Then clarify the phenomena's impact on the architectural design of individual house in Baghdad. The theoretical frame is built to extract the research indicators ( economic, social and design) theoretically , then enhance them with the study of the development of the urban house in Baghdad along the 20th century. The indicators were applied on (12) samples were distributed on (2) residential districts, (Palestine Street, AL- Sadr City) which they are various in the residential areas
and they different in the social and economic level of the their dwelling, and their houses have modifications and divisions, then find its impact on the designing level of the individual house in Baghdad after 2003. The results showed that both districts in Baghdad houses have this kind of illegal division and (non.efficient , non functional relationship and some of them non ventilation) , the spread of the phenomenon reflects that there are special details in the methods of division and the modification of the houses ,That should be a widely reviewed to get to limit this Regulations in precedent phenomena and regain the residential cultural of the city.
Cancer is in general not a result of an abnormality of a single gene but a consequence of changes in many genes, it is therefore of great importance to understand the roles of different oncogenic and tumor suppressor pathways in tumorigenesis. In recent years, there have been many computational models developed to study the genetic alterations of different pathways in the evolutionary process of cancer. However, most of the methods are knowledge-based enrichment analyses and inflexible to analyze user-defined pathways or gene sets. In this paper, we develop a nonparametric and data-driven approach to testing for the dynamic changes of pathways over the cancer progression. Our method is based on an expansion and refinement of the pathway bei
... Show MoreThe use of economic resources enjoyed Iraq by especially oil resources, which constitute the main source of financial revenue, would the economic surplus outside the oil sector increases by mobilizing and rallying the labor power and turn it into an access capitalism, , was the cause of "the inaction of the productive sectors of the economy, made the investment planning process and even investment in human capital was not rationality with the increasing number of unemployed, particularly certificates and specializations high campaign, direction of the government towards market liberalism after 2003 through the, was focused not follow a clear economic policies, and the absence of planning, and the absence
... Show Moreالمستخلص يهدف هذا البحث الى تجاوز مشكلة البعدية من خلال طرائق الانحدار اللامعلمي والتي تعمل على تقليل جذر متوسط الخطأ التربيعي (RMSE) , أذ تم استعمال طريقة انحدار الاسقاطات المتلاحقة (PPR) ,والتي تعتبر احدى طرائق اختزال الابعاد التي تعمل على تجاوز مشكلة البعدية (curse of dimensionality) , وان طريقة (PPR) من التقنيات الاحصائية التي تهتم بأيجاد الاسقاطات الاكثر أهمية في البيانات المتعددة الابعاد , ومع ايجاد كل اسقاط
... Show MoreSince her early beginning in 1974 in her novel "Les armoires vides", Annie Ernaux writing about life in all its various aspects remained her main goal. This novel gave the earliest signals of what would happen later on in her literary career. Indeed, her works showed abilities of echoing reality, her sufferance and experiences via the use of simple and clear language. Add to this, her writings are to be viewed as an expression of deep felt journey, and a continuous search due to the consequent changes coming out of her identity.
We try here to give an answer to the question about writing as to whether being, to Ernaux herself, a need for the search about her social and feminist identity, or a pure literary work
... Show MoreLet R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be approximately pure submodule of an R-module, if for each ideal I of R. The main purpose of this paper is to study the properties of the following concepts: approximately pure essentialsubmodules, approximately pure closedsubmodules and relative approximately pure complement submodules. We prove that: when an R-module M is an approximately purely extending modules and N be Ap-puresubmodulein M, if M has the Ap-pure intersection property then N is Ap purely extending.
Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreLet R be associative ring with identity and M is a non- zero unitary left module over R. M is called M- hollow if every maximal submodule of M is small submodule of M. In this paper we study the properties of this kind of modules.
This paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.
In this paper, we consider a new approach to solve type of partial differential equation by using coupled Laplace transformation with decomposition method to find the exact solution for non–linear non–homogenous equation with initial conditions. The reliability for suggested approach illustrated by solving model equations such as second order linear and nonlinear Klein–Gordon equation. The application results show the efficiency and ability for suggested approach.
In this paper, integrated quantum neural network (QNN), which is a class of feedforward
neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that
... Show More