Abstract. The minimal or maximal topological space is one of the topological spaces that we will employ in fibrewise locally sliceable and fibrewise locally sectionable. Now in this research I relied on some definitions specific to the research fibrewise maximal and minimal topological spaces. We will define a fibrewise locally minimal sliceable, fibrewise locally maximal sliceable, fibrewise locally minimal sectionable and fibrewise locally maximal sectionable, and I also clarified some examples of them and used them in characteristics by also clarifying them in diagrams.
Dealing with this study to find a link principle in the construction of the system and disorder to the promise of the principles and concepts of intellectual and philosophical form and content in the act of interior design of the halls education in the Ministry of Labor and Social Affairs , which leads to a reaction design objective and functionally and to increase the strength of the effect on users of the coaches and trainers . As it informs the side cognitive and developmental study of the design of the interior spaces . So it was the goal of research in the detection of the nature of the system and disorder with Focus indicators and the type of regulations and privacy and what constitutes the framework of knowledge in order to explai
... Show MorePerhaps masculinity and femininity in our Arabic language are among the linguistic issues that have occupied the attention of researchers, ancient and modern. Many books, works, and research have been written on this subject, but there is still something in it that must be revealed, clarified, and established, as the ancients did not classify the feminine and masculine into real, metaphorical, auditory, analogical,
The scholars of Arabic - may God reward them with the reward of the doers of good - laid down the rules of this language, the cycle of which never ceases to dazzle minds, so they adopted principles according to which they judged the denomination of this word, and the accusative of that, and determined in its light the worker and the done, until they reached us the rules and foundations of our dear language, and it is obvious that they differ. The origins of grammarians from one school of thought to another, or from one world to another, especially with regard to the subsidiary rules, and this difference was clearly reflected in what we have received from the rules, as we find a difference in the rulings that they restricted to the one fa
... Show MoreIn this paper a new series of morpholine derivatives was prepared by reacting the morpholine with ethyl chloro acetate in the presence triethylamine as a catalyst in benzene gave morpholin-N-ethyl acetate(1) which reacted with hydrazine hydrate in ethanol, and gave morpholin-N-ethyl acetohydrazide (2) . Morpholin-N-aceto semithiocarbazide (3) were prepared by reacting compound(2) with ammonium thiocyanate , concentrated hydrochloric acid and ethanol as a solvent .Compound (3) reacted with sodium hydroxide and hydrochloric acid to give 5-(morpholin-N-methylene)-1H-1,2,4-triazole-3-thiol (4) .The new series of 1,2,4-triazol derivatives (5-8) was synthesized by reaction of compound(4) with formaldehyde , DMF as a solvent and different
... Show MoreThe research aims to identify the meaning of drug addiction, which being one of the behavioral-deviation signs. It largely seems similar to alcohol-addiction. World health organization has defined drug addiction as a sporadic or chronic-state of intoxication emerges of recurrent-consumption of drugs that impact harmfully on individual and society. The second aim is to study the psychological and health implications on drugs’ users and thirdly to design a psychological-program for those who take drugs.
Onomatopoeia has always been a functional poetic device which enjoys a high sound significance in the poetry of many languages. In modern English and Arabic poetry alike, it proves to be vital and useful at different levels: musical, thematic and at the level of meaning. Still, the cultural difference looms large over the ways it is employed by the poets of each. The present paper investigates the employment of onomatopoeia in the poetry of D. H. Lawrence (1885-1930) and Badr Shakir al-Sayyab (1926-1964) who are chosen due to the importance they enjoy in modern English and Arabic poetry and the richness of their poems in onomatopoeias. The conclusions reached at are in a sense related to cultural differences which govern the use of onomato
... Show MoreIn this work, the calculation of matter density distributions, elastic charge form factors and size radii for halo 11Be, 19C and 11Li nuclei are calculated. Each nuclide under study are divided into two parts; one for core part and the second for halo part. The core part are studied using harmonic-oscillator radial wave functions, while the halo part are studied using the radial wave functions of Woods-Saxon potential. A very good agreement are obtained with experimental data for matter density distributions and available size radii. Besides, the quadrupole moment for 11Li are generated.
Deception is defined as a linguistic and non-linguistic behavior that is used in interaction in order to make the addressees believe what is believed to be false or lack evidence. McCornack (1992) classifies deception into four manipulative strategies (i.e., fabrication, distortion, equivocation and concealment), other scholars argue that deception encompasses the strategies of “fabrication (outright lying), equivocation (being vague and ambiguous), or concealment (with holding relevant information) Thus, the present study investigates the deception strategies and motives that are used by Johnny Depp and Amber Heard during their defamation trials. Qualitative and quantitative methods are employed when analyzing the data in question. Th
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show MoreHow I was eager to research the ruling on three of the most dangerous types to Islam and Muslims (the heretic, the sorcerer, the innovator, and related terms).
Because it is the most dangerous deadly disease that destroys the hearts of Muslims, and may even expel a Muslim from the circle of Islam, and how many Muslims have done or committed such a thing without knowing it. Indeed, how many Muslims have left Islam and whose wife has abandoned him without realizing it, and among them are those who have committed it without knowing it. As well as related words associated with heresy.( )
Because people debated such matters between extremists and lenient ones, most of whom were extremists, and they did not reach a conclusion. So I decid