Preferred Language
Articles
/
jcoeduw-739
Aesthetics third line of the Diversity of his methods in the architecture at Mosques
...Show More Authors

The Islamic Arts which include calligraphy and specifically the third line of the greatest
manifestation of Islamic civilization affair, and it was the mosques and mosques and holy
shrines scattered in the city of Baghdad, which had a deep impact in enhancing
communication
This means research study (third line aesthetics diversity of tactics in the architecture of
mosques) It is located in four seasons, which included the first chapter the research problem
represented by asking the following - :
-What are the methods of implementation of the third line in the architecture of mosques ?
And reflected the importance of research in it represents a serious attempt to investigate the
diversity in the organization design for linear configurations that promote communication
within and outside the mosques, mosques and holy sites located within the province of
Baghdad .
The objective of the study revealed the diversity of the methods implemented in the third line
Islamic mosques
The limits of the research has identified a third line configurations study varied within and
outside the corridors of mosques and mosques and holy sites of the era (2012 m -2013 m) and
their current, then seal chapter defines some of the terminology related to the subject matter ...
The second chapter goal of the theoretical framework and previous studies it was composed
of three sections define the first topic to address the third line study and aesthetic
characteristics .
The second topic was addressed by the researcher of the third line design spaces in the
building of mosques
The third chapter objective procedures for the research included the study population (42)
configuration in writing thuluth after excluding models repeated and similar and that Ataatuaq
with the objectives of the study or for other reasons, has chosen the researcher models sample
studied by the limited number (6) in a deliberate problem 20% of the Total community
researcher to study the original post after a group of experts with competence .
The samples were analyzed according to the sample analysis form that contributed to a lot of
experts .
The fourth chapter included the results of the study after an analysis and discussion of the
sample, which came the following - :
.1. Unity showed marked by the relationship with the other part, the part and the whole of
these relations is no doubt as to strengthen communication and raise satisfaction of sight at
the same time contribution in achieving the aesthetic diversity (sample models (
.2. Varied nature of the third line configurations implemented on the architectural elements in
the mosques and shrines between smooth and rough and Mabinhma diversity Mc contributes
largely to raise attention and enhance the aesthetic style within an area (sample models (
The conclusions that have chosen the most important researcher represented, including the
following - :
1.That each composition thuluth rhythm distinguishes whether free or regular or irregular,
uninteresting, or non-monotonic, or it may be a rhythm going because it expresses repeating
motor combines the unit and variable, one of the foundations of aesthetic overlay linear,
which has to be achieved in artwork
2.Calligrapher has maintained the consistency of parts of the characters with the college of the
Authority for the linear superposition of where (distance, height, and accuracy .(
And continue with the findings and conclusions of the recommendations and proposals
came then followed by a list of sources and supplements and then study researcher concluded
with a summary of research in the English language

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 30 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Using the Artificial Gas Lift to Increase the Productivity of Noor Oil Field / Mishrif Formation
...Show More Authors

Noor Oil Field is one of Iraqi oil fields located in Missan province / Amarah city. This field is not subjected to licensing rounds, but depends on the national effort of  Missan Oil Company. The first two wells in the field were drilled in seventies and were  not opened to production until 2009. The aim of this study is to study the possibility of using the method of gas lift to increase the productivity of this field . PROSPER software was used to design the continuous  gas lift by using maximum production rate in the design.

   The design was made after comparing  the measured pressure with the calculated pressure, this comparison  show  that the method of Beggs-Brill and Petroleum Exper

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Improve the Performance of PID Controller by Two Algorithms for Controlling the DC Servo Motor
...Show More Authors

The paper uses the Direct Synthesis (DS) method for tuning the Proportional Integral Derivative (PID) controller for controlling the DC servo motor. Two algorithms are presented for enhancing the performance of the suggested PID controller. These algorithms are Back-Propagation Neural Network and Particle Swarm Optimization (PSO). The performance and characteristics of DC servo motor are explained. The simulation results that obtained by using Matlab program show that the steady state error is eliminated with shorter adjusted time when using these algorithms with PID controller. A comparative between the two algorithms are described in this paper to show their effectiveness, which is found that the PSO algorithm gives be

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
Developing the Complexity and Security of the Twofish Algorithm Through a New Key Scheduling Design
...Show More Authors

     The Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make eac

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Integration The Cost Techniques with Balanced Scorecard for The Purposes of Measuring and Evaluating Performance
...Show More Authors

The effective application of the method of measuring and evaluating performance according to the Balanced  Scorecard the need for an information system a comprehensive and integrated for internal and external environment, Which requires the need to develop accounting information system in general and cost management information systems to suit the particular requirements of the environment in terms of the development of modern methods of measurement to include the use of some methods that have proven effective in measuring and evaluating performance.

The research problem in need of management to develop methods of measuring and evaluating performance through the use of both financial measures and non

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Physics Of Atomic Nuclei
Study of the Halo Structure for Some Light Neutron-Rich Nuclei Using the Cosh Potential
...Show More Authors

The radial wave functions of the cosh potential within the three-body model of (Core+ 2n) have been employed to investigate the ground state properties such as the proton, neutron and matter densities and the associated rms radii of neutron-rich 6He, 11Li, 14Be, and 17B exotic nuclei. The density distributions of the core and two valence (halo) neutrons are described by the radial wave functions of the cosh potential. The obtained results provide the halo structure of the above exotic nuclei. Elastic electron scattering form factors of these halo nuclei are studied by the plane-wave Born approximation.

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Energy Procedia
Studying the effect of adding buffer gases to CO2 gas on the electron transport parameter
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Posterior Estimates for the Parameter of the Poisson Distribution by Using Two Different Loss Functions
...Show More Authors

In this paper, Bayes estimators of Poisson distribution have been derived by using two loss functions: the squared error loss function and the proposed exponential loss function in this study, based on different priors classified as the two different informative prior distributions represented by erlang and inverse levy prior distributions and non-informative prior for the shape parameter of Poisson distribution. The maximum likelihood estimator (MLE) of the Poisson distribution has also been derived. A simulation study has been fulfilled to compare the accuracy of the Bayes estimates with the corresponding maximum likelihood estimate (MLE) of the Poisson distribution based on the root mean squared error (RMSE) for different cases of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Determine the optimal policy for the function of Pareto distribution reliability estimated using dynamic programming
...Show More Authors

The goal (purpose) from using development technology that require mathematical procedure related with high Quality & sufficiency of solving complex problem called Dynamic Programming with in recursive method (forward & backward) through  finding series of associated decisions for reliability function of Pareto distribution estimator by using two approach Maximum likelihood & moment .to conclude optimal policy

View Publication
Crossref
Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Economics And Administrative Sciences
Prevent administrative and financial corruption behaviors by activating the functions of the organizational immunity system
...Show More Authors

The current research aims at testing the relationship between organizational immunity and preventing administrative and financial corruption (AFC) in Iraq. The Statistical Package for the Social Sciences program (R& SPSS) was used to analyse the associated questionnaire data. The research problem has examined how to activate the functions of the organizational immune system to enable it to face organizational risks, attempt to prevent administrative and financial corruption, and access the mechanisms by which to develop organizational immunity. A sample of 161 individuals was taken who worked in the Directorate General of Education, Karbala. Also, it was concluded to a lack of memory function for organizational immunity. In a

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jan 18 2022
Journal Name
Iraqi Journal Of Science
The Limitation of Pre-processing Techniques to Enhance the Face Recognition System Based on LBP
...Show More Authors

Most systems are intelligent and the industrial world is moving now towards
technology. Most industrial systems are now computerized and offer a high speed.
However, Face recognition is a biometric system that can identify people from their
faces. For few number of people to be identified, it can be considered as a fast
system. When the number of people grew to be bigger, the system cannot be adopted
in a real-time application because its speed will degrade along with its accuracy.
However, the accuracy can be enhanced using pre-processing techniques but the
time delay is still a challenge. A series of experiments had been done on AT&TORL
database images using Enhanced Face Recognition System (EFRS) that is

... Show More
View Publication Preview PDF