The Arabic language is one of the honoring languages that has a supreme status. Being the language of the Holly Qura'an has increased its refinedness and spread in the Islamic and non-Islamic world. It has become the means of communication and conversation, and the language of knowledge and thought. The multiplicity of its dialects and accents is a sign of its capacity. Many Roman, Persian, and Greek sciences and arts have been translated and Arabicized into it. It has further become the formal language of communication in the world. Many great Arab scholars have played a role in examining it to maintain and elevate it. One of these scholars is the great scientist Mohammad Muhi Ad-Deen Abdulhameed who has done great syntactic efforts in Ibin Akeel's explanation, the topic of the present research. This is because Mohammad has great efforts and status in laying the bases of Arabic syntax through his categories, invaluable publishing in different branches of Arabic language, such as: syntax, morphology, literature, rhetoric, especially in the explanation of Ibin Akeel. The paper will also shed light on Mohammad's origin, date of birth, age, bringing up, professors, his students, the important events that affected his academic life, his scientific and religious orientations, and the most important publishing that enriched the Arabic sciences. Then, the researcher will hopefully cover the most important issues that have been tackled by this respectful scientist in his publishing or in what others have written about him. The tackledissues either reflect his own ideas, or represent his efforts in following the previous scholars. In the human history, the number of great scholars, Imams, and scientists differs from age to age. One of these scholars is the great scientist Mohammad Muhi Ad-Deen Abdulhameed. The reason behind choosing this great figure is the desire to serve the Arabic language, and cover all what has been written on this figure and his publishing. Besides, it is hoped to give this great figure the due respect and importance as an appreciation to the things he provided to the Arabic language that in return helped elevate its status among the other world languages and enrich it with various lines of knowledge; especially when the amount of studies on this figure is still meager.
The provision of openings in serviceable reinforced concrete beams may result in a substantial decline in the beam's capacity and integrity, indicating the necessity of opening strengthening. The present study investigates the experimental response of reinforced concrete T-beams with multiple web-strengthened openings disposed in shear span to static and impact loads. Fourteen RC T-beams were tested in two groups, each of seven beams. The first group was tested under static loading up to failure, while the second group was tested under repeated impact loading until the width of shear cracks reached 0.3 mm. The residual static strengths of the beams subjected to impact loading were then determined. The test variables considered were
... Show MoreThe experiment was conducted at the Faculty of Agriculture University of Ain Shams-Egypt, from January to March 2008, to study the effect of different levels of chromium yeast (Cr-yeast) on broiler chickens performance, carcass quality and enzyme activity through 35 days of experimental periods. A total of 450 one-day old unsexed chickens (Cobb) strain were used. The birds were randomly allocated to five treatments with 3 replicates each. The treatments were control (T1) without supplementation and T2, T3, T4 and T5 which were supplemented with 0.5, 1, 1.5 and 2 mg Cr-yeast /kg diet, respectively. Live body weight and weight gain were significantly (p<0.05) higher when Cr-yeast were supplemented at 1 (T3), 1.5 (T4) and 2 (T5) mg/kg diet. Fe
... Show MoreThe technology of reducing dimensions and choosing variables are very important topics in statistical analysis to multivariate. When two or more of the predictor variables are linked in the complete or incomplete regression relationships, a problem of multicollinearity are occurred which consist of the breach of one basic assumptions of the ordinary least squares method with incorrect estimates results.
There are several methods proposed to address this problem, including the partial least squares (PLS), used to reduce dimensional regression analysis. By using linear transformations that convert a set of variables associated with a high link to a set of new independent variables and unr
... Show MoreThis research presents and discuss the results of experimental investigation carried out on geogrids model to study the behavior of geogrid in the loose sandy soil. The effect of location eccentricity, depth of first layer of reinforcement, vertical spacing, number and type of reinforcement layers have been investigated. The results indicated that the percentage of bearing improvement a bout (22 %) at number of reinforced layers N=1 and about (47.5%) at number of reinforced layers N=2 for different Eccentricity values when depth ratio and vertical spacing between layers are (0.5B and 0.75B) respectively
Compression is the reduction in size of data in order to save space or transmission time. For data transmission, compression can be performed on just the data content or on the entire transmission unit (including header data) depending on a number of factors. In this study, we considered the application of an audio compression method by using text coding where audio compression represented via convert audio file to text file for reducing the time to data transfer by communication channel. Approach: we proposed two coding methods are applied to optimizing the solution by using CFG. Results: we test our application by using 4-bit coding algorithm the results of this method show not satisfy then we proposed a new approach to compress audio fil
... Show Moresolation of candida spp. From cancer patients who suffered oral candidiasis due to immunodeficiency
this paper presents a novel method for solving nonlinear optimal conrol problems of regular type via its equivalent two points boundary value problems using the non-classical
The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show More