The aim of study is to shed light on an Islamic city which is unknown for a lot of people, it can have an old history in Parisian country and many events happen with it , This city is characterized with political, military, economic scientific ,and social features, This city is called Zanjan and it is one of the most important cities because it dates back to the period of post history and it has a good geographic location whereas it was, passage for trade caravans to pass through as well its land which was specialized in agriculture and industry. the study follows chronological order of historical events for the city, one of the most significant conclusions is to think that this city does belong to artifacts and it is an old city and it has an old history,this city was founded by the king Ardsheer Babkan and he was a big Sasanian king, a lot of different religions like old Parisian zaradishat, Christianity, and Jewish. The study tries to uncover nature of developments and political events which the city witnessed where it was front for different political powers in order to take control over Abbasid succession, As for geographical location, it can have big impact on different dimensions .
Ajloun Governorate is considered the smallest governorate in Jordan in terms of area, and its population density rises to 472.2 people/ km2 and is distributed among five municipalities. The Al-Shafa municipality is one of these municipalities. Al-Shafa is rich in its natural and human resources, and the first municipal council was established in it in 2001.
This study seeks to achieve the following general objective: inventory the natural and human resources that Al-Shafa enjoys, and highlight the role of Al-Shafa municipality in achieving and settling sustainable development for the local community. Certain content, which are: the comprehensive approach to geographical reality, the descriptive
... Show MoreThis study aims to identify the teaching problems that teachers of students with intellectual disabilities face, in addition to exploring the solutions suggested by them in order to overcome such problems or challenges. The researchers used a qualitative approach in order to understand the teachers' perceptions about these problems in a more in-depth way. The interview tools (in-depth and semi-structured interviews) were used to collect data from (3) female teachers from special education programs in the Asir region. The results revealed a number of themes including problems related to students, teachers and the teaching methods they use, curricula, school environment, and school administration. Moreover, the results indicated that famil
... Show MoreThe paper studies the description of the colloquial and popular vocabulary used by wholesales tradesmen in Varonech before the Bolshevik Revolution . The vocabulary were used in the personal letters written by the poet and sent to famous poets and critics like Belenisky, kryvesky and Malsheve. And some were sent to his father and his sister. Not only did these letter bear the personal taste, but they represented a literary product reflecting on the poet's impressions, views, ambitions, and opinion in arts, poetry, prose, and theatre. The researcher used about thirty instances of various levels of grammar, style and phonology, all representing colloquial vocabulary used commonly at the time of Alexi 
... Show MoreThe polygamy as a social was known before Islam, has kept Islam on this system after it organized and put his controls and conditions, as justice between wives and the ability to alimony, it was not the purpose of satisfying the instinct of man and enjoyment, but his goal nominal than that, because it addresses problems humanity has goals noble, so the pluralism overlap of the fabric of families belonging to governance and benefits for women and men and society, which leads to increased ties of love between people of the same society and thus increases the cohesion and importance of the topic and its association with financial conditions have emerged as needed so you viewed in the second scientific Conference of the Department social Ser
... Show MoreA novel demountable shear connector is proposed to link a concrete slab to steel sections in a way that resulting steel-concrete composite floor is demountable, i.e. it can be easily dismantled at the end of its service life. The proposed connectors consist of two parts: the first part is a hollow steel tube with internal threads at its lower end. The second part is a compatible partially threaded bolted stud. After linking the stud to the steel section, the hollow steel tube can be fastened over the threaded stud, which create a complete demountable shear connector. The connector is suitable for use in both composite bridges and buildings, and using cast in-situ slabs, precast solid slabs, or hollow-core precast slabs. A series of push-off
... Show MoreABSTRACT : Alzheimer’s disease (AD) is one of the most common inflammatory neurodegenerative diseases linked with dementia, it is characterized by the deposition of amyloid beta-peptide (Ab) in the brain. The present study aims to innovate a biochemical relationship between AD and interleukin 38 (IL-38) as an anti-inflammatory cytokine, expose novel mechanisms and concepts regarding other biochemical parameters studied previously or recently in AD patients and also examine the biochemical action of memantine (10 mg daily) on AD patients. Sixty (60) diagnosed AD patients participated in the present study and classified into four (4) groups: G3 were composed of (15) newly diagnosed males (52-78) years / without treatment, G4 composed of (15
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More