This research seeks to unravel the components of the argumentative discourse in the Book ofʻRawdat al-MuhebbeenwaNozhatt al-Mushtaqeenʼ - The Garden of Lovers and the Promenade of Longing People – by Ibn Al-Qayyem Al-Jawziyah. This is because this book has a moderate discourse with a sound Islamic thought that is characterized by its sustainability, popularity, realism, and interaction with the successive developments of the new age. This reflects the intellectual maturity the composing process has reached in the philosophy of love and its educational bases in every place and time. To explore the componets, properties, and the working mechanisms of an argumentative discourse in Ibn Qayyem’s book, the present work has been conducted using a pragmatic closeness approach among the three communication polars: (sender, receiver, and message). Through the third pole, the researcher attempts to interpret the text internally, shedding light on its philosophical and aesthetic semantic significance. Such a type of analysis helps reveal the logical argument that conforms to the spirit of the age during which the book appeared. This can be clarifiedby exploring the sender’s employed emotional arguments that are connected to the recipient and his persuasive realistic experiences. All the above discussion reveals the secrets of a discourse and its hidden points, establishes the values of a dialogue and persuasion, accepts the differences,and reconciles between the different opinions.Accordingly, an argumentative entery has been chosen as it represents a communicative act that is based on a set of interactive rules orientinginterlocuters’ intentions.
The university course timetable problem (UCTP) is typically a combinatorial optimization problem. Manually achieving a useful timetable requires many days of effort, and the results are still unsatisfactory. unsatisfactory. Various states of art methods (heuristic, meta-heuristic) are used to satisfactorily solve UCTP. However, these approaches typically represent the instance-specific solutions. The hyper-heuristic framework adequately addresses this complex problem. This research proposed Particle Swarm Optimizer-based Hyper Heuristic (HH PSO) to solve UCTP efficiently. PSO is used as a higher-level method that selects low-level heuristics (LLH) sequence which further generates an optimal solution. The proposed a
... Show MoreThe interest in green energy in recent years is very noticeable, as this energy is a very important alternative that can replace fuel in many applications, most notably electric power generation, so work must be done to develop a form of this energy such as wind energy by working on the development of turbines. The DMST method provided by Qblade software is an integrated tool for making a simulation of a vertical axis wind turbine (VAWT). The simulation was carried out on vertical axis wind turbines, designing turbine blades according to symmetrical NACA0018, and calculating some parameters such as power, torque and power coefficient. It is found that this type of turbine can be improved by treating the blade edges that cont
... Show MoreBackground. After tooth extraction, alveolar bone resorption is inevitable. This clinical phenomenon challenges dental surgeons aiming to restore esthetic and function. Alveolar ridge preservation can be applied to minimize dimensional changes with a new socket grafting material, an autogenous dentin graft, produced by mechanically and chemically processing natural teeth. This study assessed the safety and efficacy of using autogenous dentin biomaterial in alveolar ridge preservation. Materials and Methods. Patients with nonrestorable maxillary anterior teeth bounded by natural sound teeth were included in this study. After a detailed clinical and tomographic examination, eligible participants were randomly allocated into two groups
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show Moresolation of candida spp. From cancer patients who suffered oral candidiasis due to immunodeficiency
A partial temporary immunity SIR epidemic model involv nonlinear treatment rate is proposed and studied. The basic reproduction number is determined. The local and global stability of all equilibria of the model are analyzed. The conditions for occurrence of local bifurcation in the proposed epidemic model are established. Finally, numerical simulation is used to confirm our obtained analytical results and specify the control set of parameters that affect the dynamics of the model.
The authors introduced and addressed several new subclasses of the family of meromorphically multivalent -star-like functions in the punctured unit disk in this study, which makes use of several higher order -derivatives. Many fascinating properties and characteristics are extracted systematically for each of these newly identified function classes. Distortion theorems and radius problems are among these characteristics and functions. A number of coefficient inequalities for functions belonging to the subclasses are studied, and discussed, as well as a suitable condition for them is set. The numerous results are presented in this study and the previous works on this
... Show MoreThis study is conducted to determine the effect of pathogenicity of the fungus Lecanicillium lecanii in some aspects of life of the insect saw toothed beetle Oryzaephilus surinamensis L. (Coleoptera: Silvanidae) under laboratory conditions with three concentrations of spores and mildew commentator (1 × 103, 1 × 105, 1 × 107) spore / ml , on eggs and larvae second phase of the insect .The study also includs the effect of the fungus concentrations of germination on rice (jasmine) by using direct spray treatment. The results show great fungus efficiency in the control of some aspects of life of the insect, where varied efficiency depends on the concentration of spores, The highest percentage loss of eggs is 63.33% at a concentration
... Show More