The architecture of the richly decorated mosques demonstrated that the Islamic culture is one of the most significant and greatest civilizations in the history of humanity. The plant decorative units are one of the key areas in which the Muslim artist excelled. As a result, he created various plant forms that he took from nature, which led him to invent the arabesque art consisting of plant motifs with curved and rounded lines or wrapped between them. These shapes with curved borders include leaves, twigs, and flowers. Buildings and artefacts from the nineteenth century AD have this shape. they achieved their objectives during the twelfth and thirteenth centuries. There was another kind of vegetable decorative unit, made up of stems and flowers drawn in arranged geometric patterns. This sort of design, which deviates from the standard in Islamic art and takes on a form more akin to that of nature, was particularly popular in Persia. The types and shapes of flowers vary, as well as the shapes of the leaves, their edges, or their miniatures. The artist also painted more plant branches with circular and spiral curves, leaves, and flowers emerging in a geometric artistic relationship in which repetition, contrast, symmetry, and overlap, which is distinguished by a hint of modification and inspiration. This later influenced art schools in the architectural decorative unit methods. Do not construct from nature.
Hate speech (henceforth HS) has recently spread and become an important issue. This type of speech in children's writings has a particular formulation and specific objectives that the authors intend to convey. Thus, the study aims at examining qualitatively and quantitatively the classism HS and its pragmatic functions via identifying the speech acts used to express classism HS, the implicature instigated as well as impoliteness. Since pragmatics is the study of language in context, which is greatly related to the situations and speaker’s intention, this study depends on pragmatic theoriespeech acts, impoliteness and conversational implicature) to analyze the data which are taken from Katherine Mansfield's short story (The D
... Show MoreAcademic boredom is one of the most emotional problems that arouse an individual's fatigueness and lowers his interest. This is because of the environment's low efficiency and of spending long monotonous time. This state is characterized by having lack of interest, difficulties in concentration, and the desire to leave the class. It is considered one of the most prominent forms of boredom widespread among students and the most severe and dangerous one that has negative effects and severe psychological and social problems. The current research aims to investigate a randomly selected sample of 335 students from the first and third grades at the directorates of education (Karkh and Rusafa) who suffers from academic boredom. Similarily
... Show MoreThis research aimed to identify the structural model of the relationship between emotional creativity and self-efficacy among male and female students of the preparatory year at Tabuk University. The current study adopted the descriptive correlational approach, as it is appropriate to the nature of the study. The study tools contained (60) items that measure the relationship between emotional creativity and self-efficacy among the male and female students of the preparatory year at Tabuk University. The study sample was chosen by the stratified random method of the study community, where the study sample reached (183) male and female students of the preparatory year at the University of Tabuk. The results of the study showed that there a
... Show MoreWith the twenty - First century, It becomes clear to us that for 110 years the Japanese - Chinese relations have been witnessing big radical events and developments. ( we take the year of 1949 as the starting date for this relations). In order to prove hypothesis the study divided in to four chapters. - The first chapter deals with explaining the factors of the subject of the Japanese - Chinese relations which described as Indirect threat and aggressive relations from Japan to China after the Second World War by Japanese entering in the American world strategy, in order to destroy the communist china's system which decleard in 1949, because the united states understood that the new system in Beijing could threat American's Interest
... Show MoreIn this paper, Nordhaus-Gaddum type relations on open support independence number of some derived graphs of path related graphs under addition and multiplication are studied.
Translating culture-specific proverbs (CSPs) is a challenging task since they often occur in a peculiar context. Further, CSPs are intended to imply meanings that extend far beyond the literal meaning of such a kind of proverbs. As far as English and Arabic are concerned, translators often encounter problems in translating CSPs due to cultural differences between the source language(SL) and the target language (TL) as well as what seems to be the lack of equivalence for some CSPs.
In view of this, the present study aims at investigating the translation of CSPs in three English-Arabic dictionaries of proverbs, namely Dictionary of Common English Proverbs Translated and Explained (2004), One thousand and One English Pr
... Show MoreThe consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen
... Show MoreThe study aimed to evaluate educational programs efficiency in applying the best educational practices to educate students from the dangers of indecent behaviors, in line with higher education policy and the appropriateness of educational program dimensions to spread awareness among students to not fall into the indecent behaviors clutches. The study adopted the inductive exploratory approach through structural equation modeling and the descriptive analysis of the collected data from randomly selected sample (n=385) from educational academics at Northern Border University in the Saudi Arabia using a specially designed survey tool to meet study purposes to evaluate dimensions of teaching methods, evaluation tools, training courses, course
... Show MoreOnline service is used to be as Pay-Per-Use in Cloud computing. Service user need not be in a long time contract with cloud service providers. Service level agreements (SLAs) are understandings marked between a cloud service providers and others, for example, a service user, intermediary operator, or observing operators. Since cloud computing is an ongoing technology giving numerous services to basic business applications and adaptable systems to manage online agreements are significant. SLA maintains the quality-of-service to the cloud user. If service provider fails to maintain the required service SLA is considered to be SLA violated. The main aim is to minimize the SLA violations for maintain the QoS of their cloud users. In this res
... Show MoreObjective: Determination the effectiveness of educational program on female students’ practices toward premenstrual.
Methodology: A quasi-experimental design study was conducted involving (140) student purposely in four secondary schools at Al-sadder city (70) student for study group and (70) for control group. The prevalence of PMS selected through American College of Obstetricians and Gynecologists (ACOG) (2015) criteria to select PMS students before program. The education program were set in four steps, the first step (pre-test) is to assess the practices, before the implementation of the program, the second step is implementing the program, following two steps post-test I and II betwe
... Show More