The historic cities in the Arab and Islamic world (including the cities of the holy shrines in Iraq) suffer from many and varied problems and most notably it is clear in its origin functional structure. It had been transformed from a basic place to live for a few thousand of the population to the center or part of the main center of large city populations of more than one million. Functional structure of the ancient city have been change with the beginning of the twentieth century and accelerated rate of change in the second half of the last century. The research aims to analyze the problems of the historic centers of holy cities and analyze the methods of dealing with these problems, leading to discrimination method could be the basis for practical handling the according to the requirements of the current era and the requirements of the realities imposed by the changes and physical interventions with an attempt to salvage some of the fabric of these centers. The research had adopted the analytic inductive approach through the analysis of the existing case and look at previous studies of the subject and the literature on the themes of maintaining and dealing with historic and heritage sites. The research has been structuring to the entrance of the conceptual framework of the topic and other part is the analysis of existing conditions for the case study area (center the historic city of Najaf), according to a critical vision and reached to scientific and practical conclusions according to modern, planning and design vision to deal with traditional areas in general and the holy places in particular.
The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech
... Show MoreIn this paper, two elements of the multi-input multi-output (MIMO) antenna had been used to study the five (3.1-3.55GHz and 3.7-4.2GHz), (3.4-4.7 GHz), (3.4-3.8GHz) and (3.6-4.2GHz) 5G bands of smartphone applications that is to be introduced to the respective US, Korea, (Europe and China) and Japan markets. With a proposed dimension of 26 × 46 × 0.8 mm3, the medium-structured and small-sized MIMO antenna was not only found to have demonstrated a high degree of isolation and efficiency, it had also exhibited a lower level of envelope correlation coefficient and return loss, which are well-suited for the 5G bands application. From the fabrication of an inexpensive FR4 substrate with a 0.8 mm thickness level, a loss tang
... Show MoreDeveloping and researching antenna designs are analogous to excavating in an undiscovered mine. This paper proposes a multi-band antenna with a new hexagonal ring shape, theoretically designed, developed, and analyzed using a CST before being manufactured. The antenna has undergone six changes to provide the best performance. The results of the surface current distribution and the electric field distribution on the surface of the hexagonal patch were theoretically analyzed and studied. The sequential approach taken to determine the most effective design is logical, and prevents deviation from the work direction. After comparing the six theoretical results, the fifth model proved to be the best for making a prototype. Measured results rep
... Show MoreThe paper is concerned with the state and proof of the existence theorem of a unique solution (state vector) of couple nonlinear hyperbolic equations (CNLHEQS) via the Galerkin method (GM) with the Aubin theorem. When the continuous classical boundary control vector (CCBCV) is known, the theorem of existence a CCBOCV with equality and inequality state vector constraints (EIESVC) is stated and proved, the existence theorem of a unique solution of the adjoint couple equations (ADCEQS) associated with the state equations is studied. The Frcéhet derivative derivation of the "Hamiltonian" is obtained. Finally the necessary theorem (necessary conditions "NCs") and the sufficient theorem (sufficient conditions" SCs") for optimality of the stat
... Show MoreThis study deals with free convection heat transfer for the outer surface of two
cylinders of the shape of (Triangular & Rectangular fined cylinders with 8-fins),
putted into two different spaces; small one with dimension of (Length=1.2m,
height=1m, width=0.9m) and large one with dimension of (Length=3.6m, height =3m,
width=2.7m). The experimental work was conducted with air as a heat transport
medium. These cylinders were fixed at different slope angles (0o, 30o, 60o and 90o)
.The heat fluxes were (279, 1012, 1958, 3005, 4419) W/m2, where heat transferred by
convection and radiation. In large space, the results show that the heat transfer from
the triangular finned cylinder is maximum at a slope angle equals
This paper presents ABAQUS simulations of fully encased composite columns, aiming to examine the behavior of a composite column system under different load conditions, namely concentric, eccentric with 25 mm eccentricity, and flexural loading. The numerical results are validated with the experimental results obtained for columns subjected to static loads. A new loading condition with a 50 mm eccentricity is simulated to obtain additional data points for constructing the interaction diagram of load-moment curves, in an attempt to investigate the load-moment behavior for a reference column with a steel I-section and a column with a GFRP I-section. The result comparison shows that the experimental data align closely with the simulation
... Show MoreThe five-a- Side Soccer for people with a minor mental disability has become as important as many other sporting events. Therefore, the researcher considers that the basic skills tests are suited to the level of the tested individuals in terms of their age and mental ability. The technical aspects were adopted as a means of selecting from They are qualified to practice this game in the simplest form, so show the importance of the problem of research through the design and codification of two tests of handling skills belonging to this category and adopted by the training cadres during the selection process. The research community for people with minor mental disabilities determines the male category of the mental and social disability instit
... Show MoreObjective: To assess the role of tumour necrosis factor alpha level and genotyping in susceptibility to leishmaniasis.Method: The case-control study was conducted from March to July 2021 at Baqubah Teaching Hospital, Diyala, Iraq,and comprised patients of cutaneous leishmaniasis in group A and healthy controls in group B. The serum level andsingle nucleotide polymorphisms of tumour necrosis factor-alpha rs41297589 and rs1800629 were compared betweenthe groups. Data was analysed using SPSS 28.Results: Of the 150 subjects, there were 75(50%) in group A; 39(52%) males and 36(48%) females with mean age23.91±13.14 years. The remaining 75(50%) subjects were in group B; 38(50.7%) males and 37(49.3%) females withmean age 22.84±4.35 years.
... Show More