The variety of ideas and freedom of expression among the authors who are looking for everything new that serves the goals of musical and aesthetic expression, which calls for the use of traditional musical instruments with the great composition of musical instruments known as the orchestra represents a great challenge in several aspects. The incompetence of some of these instruments or limited capabilities or its costly method of performance sometimes forbids its use permanently in this great composition. It was necessary to have some problems facing the composer and the player on the one hand and the recipient on the other hand, who must be looking for perfection. Among those instruments that are used regularly in the works of the orchestra are the traditional Oud instruments or what we call popular instruments.
(What are the melodic characteristics of the Oud instrument in the works of Saleem Salim for the Iraqi Symphony Orchestra?).
The researcher, in the theoretical framework, addressed the melodic characteristics of the Oud instrument and the melodic construction in the compositions of the Iraqi symphony orchestra. The research procedures included a melody analysis by Saleem Salem. The researcher came up with the following conclusion: Many different types of quartet species appeared in the sample. This indicates the melodic richness and the diversity of the maqam transitions. It also means that the melody did not depart the oriental Arabic maqam environment, although the work is written for the Oud instrument with the accompaniment of the orchestra
Substantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovat
... Show MoreAbstract
In this paper, fatigue damage accumulation were studied using many methods i.e.Corton-Dalon (CD),Corton-Dalon-Marsh(CDM), new non-linear model and experimental method. The prediction of fatigue lifetimes based on the two classical methods, Corton-Dalon (CD)andCorton-Dalon-Marsh (CDM), are uneconomic and non-conservative respectively. However satisfactory predictions were obtained by applying the proposed non-linear model (present model) for medium carbon steel compared with experimental work. Many shortcomings of the two classical methods are related to their inability to take into account the surface treatment effect as shot peening. It is clear that the new model shows that a much better and cons
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreDiabetes mellitus, or simply diabetes, is a group of metabolic diseases in which a person has high blood sugar, either because the pancreas does not produce enough insulin, or because cells do not respond to the insulin that is produced. This high blood sugar produces the classical symptoms of polyuria (frequent urination), polydipsia (increased thirst), and polyphagia (increased hunger). The aim of the study is to measure several biochemical parameters in T2DM patients and the effect of these parameters in development the disease. Laboratory investigations including Ceruloplasmin , fasting blood glucose (FBG) , malondialdehyde (MDA), serum protein, uric acid, and protein electrophoresis have been measured in patients with type
... Show MoreBackground: Hyperthyroidism is a serious public concern, due the continuous increase in its prevalence and its impact on the mortality rates. Autoimmune hyperthyroidism is seen as a thyroid gland problem. Pro-inflammatory cytokines are crucial for the growth and development of hyperthyroidism, it was shown that the level of several pro-inflammatory cytokines were higher in the hyperthyroidism patients. Objective: This work was aimed to assessment the concentration of certain cytokine in hyperthyroid patients. Materials and Methods: Sixty hyperthyroidism patients and 30 healthy individuals with age range from (30-65) years old were enrolled in this study through their presence at the National Center for Diabetes Treatment and Research in Bag
... Show MoreBackground: The etiology of Systemic lupus erythematosus seems to be multifactorial including environmental as well as genetic factors. The genetic predisposition was supported by the occurrence of Systemic lupus erythematosus in more than one member of a family as well as in identical twins.
Aim of the study: To determine the human leukocyte antigen typing class I (A and B) in patients with Systemic Lupus Erythematousus disease.
Methods: Patients group consisted of 44 Iraqi Arab Muslims patients with Systemic lupus erythematosus disease who presented to Baghdad Medical City from January 2010 to January 2012 from Baghdad Province. The second control group consisted from 80 Iraqi Arab Muslims volunteers from hospital employees and t
Individual cannot live alone due to to his need for others to facilitate His supplies for living, thus social affiliation is considered one of the most important psychological, social needs in individuals life through his willing to affiliate to others whether they were friends ,family, colleague , or even home to reach some degree of psychological stability.
Affiliation is a tool to search for Satiate through living with group from the same type or comply for group or to be compatible with them or even to be adherent and accept what the group agreed about of criterion.
 
... Show MoreBackground: Acute myeloid leukemia (AML) is a genetically heterogeneous leukemia characterized by abnormal myeloid blast accumulation, disrupting normal hematopoiesis and leading to rapid progression. Objective: To investigate SNPs within the 3’UTR of the CCAAT/enhancer-binding protein alpha (CEBPA) gene and its association with AML in Iraqi patients. Methods: The study was carried out on 120 AML patients classified into newly diagnosed, induction chemotherapy, and consolidation chemotherapy stages (40 each), and 40 individuals as a control group. Genomic DNA was extracted from AML patients and controls, followed by PCR amplification and Sanger sequencing of the 3’UTR region of the CEBPA gene. The AML patients were characterized
... Show More