The Egyptian and Iraqi schools are one of the most important musical schools in the style of playing the oud. The influence of the style of these schools extended in the contemporary Arab world, and there were important names that emerged characterized with their style of playing. Thus, the ways of tuning the strings of oud varied between the two schools because of the difference in the ways of playing and the difference in the style of expression. The aim of the research was to identify the pluralism of the variable tunings of the strings of the contemporary Arab oud of the Egyptian and Iraqi schools, along the historical period extending from the late nineteenth and twentieth centuries to the present time. The oud has been classified into (five, six and seven strings). The samples representing the two schools were chosen intentionally, according to the variable in the tuning, and according to the classifications of the type of oud. The traditional five-string tuning of the oud has been relied on, derived from the quartet equation of Al-Kindi, as a principle to know the variable in the tuning of the contemporary Arab Oud. Types of tuning in both schools and the extent of similarity and difference between them linked to the method of performance and expression of the two schools have been identified.
In this work, As60Cu40-xSex thin films were synthesized, and the pulsed laser deposition method was used to study the effected partial replacement of copper with selenium. The electrical characteristics and optical characteristics, as indicated by the absorbance and transmittance as a function of wavelength were calculated. Additionally, the energy gap was computed. The electrical conductivity of the DC in the various conduction zones was calculated by measuring the current and voltage as a function of temperature. Additionally, the mathematical equations are used to compute the energy constants, electron hopping distance, tail width, pre-exponential factor, and density of the energy states in variation zones (densities of the energ
... Show MoreHumans knew writing and to blog motivated by the need for registration and documentation, and tried from the very beginning of research to find the most suitable material for this purpose, he used many different materials in form, nature, and composition, so it is written on the mud by the ancient Sumerian people in different forms and when the text is long Numbered as the pages of the book at the present time, this research will deal with the damage to manuscripts and then find ways to address them.
This study aims to conduct an exhaustive comparison between the performance of human translators and artificial intelligence-powered machine translation systems, specifically examining the top three systems: Spider-AI, Metacate, and DeepL. A variety of texts from distinct categories were evaluated to gain a profound understanding of the qualitative differences, as well as the strengths and weaknesses, between human and machine translations. The results demonstrated that human translation significantly outperforms machine translation, with larger gaps in literary texts and texts characterized by high linguistic complexity. However, the performance of machine translation systems, particularly DeepL, has improved and in some contexts
... Show MoreLaboratory experience in Iraq with cold asphalt concrete mixtures is very limited. The design and use of cold mixed asphalt concrete had no technical requirements. In this study, two asphalt concrete mixtures used for the base course were prepared in the laboratory using conventional cold-mixing techniques to test cold asphalt mixture (CAM) against aging and moisture susceptibility. Cold asphalt mixtures specimens have been prepared in the lab with cutback and emulsion binders, different fillers, and curing times. Based on the Marshal test result, the cutback proportion was selected with the filler, also based on the Marshal test emulsion. The first mixture was medium setting cationic emulsion (MSCE) as a binder, hydrate
... Show MoreA new series of morpholine derivative were prepared by reacting the morpholine with ethyl chloro acetate in the presence triethylamine as an catalyst and benzene as a solvent gave the ethyl morpholin-4-ylacetate reaction with hydrazine hydrate and ethanol as a solvent gave the 2-(morpholin-4-yl)acetohydrazide gave series of Schiff base were prepared by reacting 2-(morpholin-4- yl)acetohydrazide with different aromatic aldehydes and ketons . The new series of (3-9 )were synthesis by reaction of Schiff base (10-14) with chloroacetyl chloride, triethyl amine as an catalyst and 1,4dioxane as a solvent .The chemical structures of the synthesis compound were identified by spectral methods their [ IR ,1H-NMR and 13C-NMR ].The synthesised compoun
... Show MoreThis study aims to investigate the features of stellar-gaseous kinematics and dynamics mass using scaling coefficient relationships (such as the Faber–Jackson relation (FJR)) of two samples of elliptical and lenticular galaxies. These two samples of 80 ellipticals and 97 lenticulars were selected from previous literature works. The Statistical Package for Social Sciences )SPSS( and Matrix Laboratory (MATLAB) program were used to find out the associations of multiple factors under investigation such as main kinematic properties of the gaseous-stellar (effective radius Re, surface density within the effective radius (Ʃeff) , stellar mass in the blue band (Mstar (B)), gas mass ( Mgas), dynamic (Mdyn) and baryonic (Mbar), supermassiv
... Show MoreIt is no secret that the prophets speech is of great importance, as the second source of Islamic legislation after the Holy Quran, and as such we must reserve and verify the authenticity of the novel and the narrators seizure, and all the conditions laid down by the scholars.
The subject of our research here concerns part of this verification, which is the unknown, the subject of the unknown hadith is considered a matter of great interest by the modernists because it relates to the validity of the novel and the narrators, and the methods of the modernists varied in terms of the reasons for this weakness, the fool never entertained them by the reckless narrative.
I chose the subject of my research the types of Mahjail and
... Show MoreObiovisly that the holy thresholds are directly related to Islam and Muslims and related to the general culture of the Islamic peoples. In terms of architecture, it is considered a distinctive architectural scene that reviews the history of this origin and its architectural styles. Recently, with the increase in the number of pilgrims and visitors to the holy shrines, there is a need to develop and expand the buildings and provide them with services and introduce modern technology. The building of the holy thresholds consists of a number of functional design indicators: The general problem of research is that there is no clear theoretical framework for the design indicators for the development of the holy shrines according to the functio
... Show MoreIschemic stroke is a significant cause of morbidity and mortality worldwide. Autophagy, a process of intracellular degradation, has been shown to play a crucial role in the pathogenesis of ischemic stroke. Long non-coding RNAs (lncRNAs) have emerged as essential regulators of autophagy in various diseases, including ischemic stroke. Recent studies have identified several lncRNAs that modulate autophagy in ischemic stroke, including MALAT1, MIAT, SNHG12, H19, AC136007. 2, C2dat2, MEG3, KCNQ1OT1, SNHG3, and RMRP. These lncRNAs regulate autophagy by interacting with key proteins involved in the autophagic process, such as Beclin-1, ATG7, and LC3. Understanding the role of lncRNAs in regulating auto
One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show More