The research is marked by (Development Design Interior spaces for children's theater halls in the city of Baghdad). Which consists of four chapters, namely, the first chapter the research problem and the need for him, which included identifying the research problem and of poor achievement of aesthetic values and functional at the scene of the child and its significance in that it is a way of cultural entertainment education of the child and its objectives as it aims to evelop interiors for children's theater, and its limits. Theater Magic Lantern in the city of Baghdad, the second chapter addressed the theoretical framework, which consists of the psychology of the child, and space Children's Theatre and types, forms of children's theater
... Show MoreThe recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreIn data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me
Background: Colonic cancer is a very common disease world-wide being fourth most common cancer characterized by abnormal proliferation of the inner wall of colon then taking full colon wall thickness then spreading to surrounding lymph nodes and tissues and finally distant metastasis. It is one of most complicated diseases with debilitating symptoms which becomes more sever , prominent and specific with advancing stage with high percent of fatality and relatively short survival if diagnosed late or if left untreated.Objective: To evaluate the efficacy of serum CEA & sAPRIL levels in the diagnosis and screening of colon cancer and their validity for this.Patients and methods: This study was applied on 35 patients with colonic can
... Show MoreTo finalize any construction investment project, it would be necessary to identify the most significant problems and obstacles that lead to project reluctance and stalling. Unexpected events and conflicts may have disrupted these strategies and impacted project development. Due to the high initial investment costs of construction projects, crises can have an immediate impact, resulting in significant financial losses. The 2014 financial crisis was one of the most prominent crises that Iraq faced, which prompted the researcher to identify and evaluate those obstacles through this research and questionnaires using Pareto scientific theory to exclude factors that do not contribute to project lag. It was discovered that 28 o
... Show MoreBackground: The world health organization estimates that worldwide 2 billion people still have iodine deficiency Objectives: Is to make comparison between the effect of identification of recurrent laryngeal nerve (RLN) and non-identification of the nerve on incidence of recurrent laryngeal nerve injury (RLNI) in different thyroidectomy procedures.
Type of the study: cross –sectional study.
Methods: 132 patients with goiters underwent thyroidectomy .Identification of RLN visually by exposure were done for agroup of them and non-identification of the nerves for the other group. The outcomes of RLNI in the two groupsanalyzed statistically for the effect of
... Show MoreObjective: To identify barriers to healthcare access, to assess the health literacy levels of the foreign-born Arabic speaking population in Iowa, USA and to measure their prevalence of seeking preventive healthcare services. Methods: A cross-sectional study of native Arabic speaking adults involved a focus group and an anonymous paper-based survey. The focus group and the Andersen Model were used to develop the survey questionnaire. The survey participants were customers at Arabic grocery stores, worshippers at the city mosque and patients at free University Clinic. Chi-square test was used to measure the relationship between the characteristics of survey participants and preventive healthcare services. Thematic analysis was
... Show MoreBackground: Patients with decompensated cirrhosis are often given therapeutic and prophylactic drugs. Polypharmacy raises both the likelihood of prescription errors and the complications associated with drugs. Clinical pharmacists are excellent at recognizing, addressing, and preventing clinically significant drug-related problems.
Objectives: Identification types of pharmacist interventions to address drug-related problems in patients with decompensated cirrhosis and assess the acceptance/implementation of these recommendations. And identify patient factors associated with accepting pharmacist recommend
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show More