Preferred Language
Articles
/
joe-934
The Characters of the Form in the Vernacular Architecture A comparative study of the form's characters of facades of individual houses and commercial buildings in the City of Baghdad after 2003–Zayoona district as a case study
...Show More Authors

The characters of facades' form of the Iraqi building after 2003 have been changed, it has been described by many names. The problem of the research is that what are the features of the characters of the form in the façades of the buildings in Baghdad city after 2003? Are the façade of the individual houses or the commercial buildings is the heaviest in the visual weight? The research aims to answer those questions by choosing the vernacular architecture as a measurement tool. It is the informal image of the architecture, which is built by people informally and spontaneously, without official control and legislation to be organized. This is smellier to what has happened in Baghdad, after 2003 according to previous study submitted by the same researcher (The phenomenon of trespassing the architectural design regulation in the Iraqi cities 2003-2016- case study Baghdad) the individual houses as a case study. The research method has dealt with the previous studies, and with the terms and the vernacular architecture in some Arabic countries. The research determines the features of the form's characters in the façades of the vernacular architecture in Egypt, Yemen, and Palestine as the generic features of the vernacular taste in Arabic societies.  The researcher examines these features by checking list and Excel program and by selecting samples in Zayoona district after 2003 as a case study. The research's hypothesis has proved that the form's characters of local façades in Baghdad after 2003 are a rural vernacular. The facades of the individual houses have had the heaviest influences at the visual weight. The research has concluded that the characters of the vernacular architecture's form have common and basic styles among societies. when it has manifested in cities, showed their architectural style and identity, it indicates a decline in both architectural style and identity. The heavy influences of the visual weight in Iraqi architecture after 2003 depends on the decoration included two types: the rhythmic and geometric decoration, being important elements in the facades.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Brain Dominance Learning Styles for Secondary School Students Distinguished and Ordinary
...Show More Authors

The current research aims at detecting Brain Dominance Learning Styles distinguished
and ordinary secondary school students (males and females).The researcher adopted Torrance
measure, known as ‘the style of your learning and thinking to measure Brain Dominance
Learning Styles’, the codified version of Joseph Qitami (1986); picture (a). The researcher
verified the standard properties of tool. The final application sample was 352 distinguished
and ordinary students; 176 distinguished male and female students and 176 ordinary male and
female students at the scientific fifth level of secondary school from schools in the province of
Baghdad, AL- KarKh Education Directorates in the First and Second . and who have been

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Finger Vein Recognition Based on PCA and Fusion Convolutional Neural Network
...Show More Authors

Finger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network

... Show More
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
HYBRID CIPHERING METHOD BASED ON CHAOS LOGISTIC MAP AND FINGERPRINT INFORMATION
...Show More Authors

In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o

... Show More
Publication Date
Wed Jun 24 2015
Journal Name
Chinese Journal Of Biomedical Engineering
Single Channel Fetal ECG Detection Using LMS and RLS Adaptive Filters
...Show More Authors

ECG is an important tool for the primary diagnosis of heart diseases, which shows the electrophysiology of the heart. In our method, a single maternal abdominal ECG signal is taken as an input signal and the maternal P-QRS-T complexes of original signal is averaged and repeated and taken as a reference signal. LMS and RLS adaptive filters algorithms are applied. The results showed that the fetal ECGs have been successfully detected. The accuracy of Daisy database was up to 84% of LMS and 88% of RLS while PhysioNet was up to 98% and 96% for LMS and RLS respectively.

Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Apr 01 2026
Journal Name
Atención Primaria
Association between smoking and chronic low back pain among medical students
...Show More Authors

Resumen Introducción Debido a su exigente entorno académico, el dolor lumbar crónico (DLC) es un trastorno musculoesquelético común entre los estudiantes de medicina, lo cual es particularmente preocupante. El tabaquismo es un factor de riesgo conocido por causar diversos problemas de salud y se ha asociado con el DLC, pero la relación específica entre el tabaquismo y el DLC aún no ha sido bien explorada. Objetivo Este estudio tiene como objetivo investigar la asociación entre el tabaquismo y el DLC en estudiantes de medicina en Irak. Diseño Se empleó un diseño descriptivo transversal que involucró entrevistas cara a cara con 200 estudiantes de medicina de 18 años o más. Los datos sobre características demográficas, comport

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Breast Cancer Detection using Decision Tree and K-Nearest Neighbour Classifiers
...Show More Authors

      Data mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the  most effective parameter, particularly when Age<49.5. Whereas  Ki67  appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu

... Show More
Scopus (14)
Crossref (9)
Scopus Crossref
Publication Date
Sat Mar 01 2025
Journal Name
Iranian Journal Of Nursing And Midwifery Research
Girls’ Self-Esteem and its Association with Self-Stigma toward Obesity
...Show More Authors
Abstract<sec> <title>Background:

Obesity among girls can lead to physical, psychological, or social problems. Enhancing self-esteem and reducing self-stigma toward obesity can play a crucial role in girls’ health. This study aims to assess girls’ self-esteem and its association with self-stigma toward obesity.

Materials and Methods:

A descriptive cross-sectional design was used to meet the study’s objective. A convenience sampling method was used to gather the sample from 24 middle and high schools in five cities across Iraq from (January

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Oct 03 2025
Journal Name
Mesopotamian Journal Of Computer Science
Enhanced TEA Algorithm Performance using Affine Transformation and Chaotic Arnold Map
...Show More Authors

In digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
Leadership qualities among kindergarten children and its relationship to some variables
...Show More Authors

There is no doubt that leadership is a social phenomenon , and human activity does not take place , but remained in the family cohesive have a common goal Alaho instil confidence in the same of her sons to be better , and the importance of this subject Arta researchers to identify the extent to which children in this phenomenon and to identify the causes and extent of its spread in the community , has been directing an open question (Appendix 1) to a group of kindergarten teachers , to learn about the characteristics of leadership that can be enjoyed by kindergarten children . The current research aims to:
1. Detect levels of leadership qualities among kindergarten children in the light of the characteristics of leadership skills
2

... Show More
View Publication Preview PDF