The present research studies numbers and its uses in the Islamic ornament. The study consists of four chapters; the first is dedicated to the problem of the research, the value of the study, and the aim of the study, and its limit. The problem of the study deals with the uses of numbers in Islamic ornament and how these numbers were used for aesthetic purposes. What are the analytical bases that enable us to read the geometrical compositions ornament numerically? The value of the research is the study forms an analytical and visual study of the numbers in the Islamic ornamentation. Additionally, this study is an aesthetic assessment to the philosophy of the number and its uses in Islamic architecture. The study is limited to the ornamentations of Al-Abbass Holy Shrine during the priod (1980- 2015). The second chapter combines the theoretical part, which studies the numbers in the Holy Quran, the geometrical compositions and their uses in the ornamentations. The third chapter is dedicated to the practical part, which discusses the population of the study, which consists of 25 ornamentation compositions, and the sample of the study consists of 5 samples. It also mentions the the reliability and the validity of the study. The fourth chapter comprises the results, conclusions, and the recommendations and suggestions. the conclusions are:1.The value of number 1 is the origin of all the numbers because number 1 is associated with God. 2.The geometry of the of the ornaments are related to nonrepresentation the shape of the star for example is related to the circle. The origin of the circle is square and the origin of the square is the right angle triangle, which is the origin of all shapes. Search and adopted a set of recommendations and proposals, the list of sources and supplements.Key words: (Islamic ornamentation, number and Achtgalath, Al-Abbass Holy Shrine)
This paper present a simple and sensitive method for the determination of DL-Histidine using FIA-Chemiluminometric measurement resulted from oxidation of luminol molecule by hydrogen peroxide in alkaline medium in the presence of DL-Histidine. Using 70?l. sample linear plot with a coefficient of determination 95.79% for (5-60) mmol.L-1 while for a quadratic relation C.O.D = 96.44% for (5-80) mmol.L-1 and found that guadratic plot in more representative. Limit of detection was 31.93 ?g DL-Histidine (S/N = 3), repeatability of measurement was less that 5% (n=6). Positive and negative ion interferances was removed by using minicolume containing ion exchange resin located after injection valve position.
Abstract That the child is aged 7 years, surrounded by information, knowledge and skillsvaried, which constitute the raw material of experience teaching and is in the rule of inputlearning, if received by the student of these data are positive, these data require research and audit, the style becomes more positive, effective, and then becomes the explorer, butnot done exploration efficiency without the visual, auditory and sensory owned by thechildren. So study aimed to identify the values of the optical track and explore mathematical and find the relationship between them. And use the descriptive approach in a manner the linkon the children of the first year of primary school age (6-7) years in my school Waziriya and Karkh, during the peri
... Show MoreBackground: Periodontal diseases are one of the major dental pathologies that affect human populations worldwide at high prevalence rates The term periodontal disease usually refers only to plaque related inflammatory disease of the dental supporting tissues. Mouth rinses which act as an anti-plaque agents mostly used as adjuncts to oral hygiene. Aims of the study: To Estimate and compare the effects of Aloe vera relative to chlorhexidine on the clinical periodontal parameters (plaque index, gingival index, bleeding on probing). Material and method: A total of 44 subjects with plaque-induced gingivitis, baseline of data were collected for (PLI, GI, and BOP) and underwent oral hygiene instruction, scaling and polishing, then divided into:
... Show MoreThe coronavirus disease 2019 (COVID-19) pandemic and the infection escalation around the globe encourage the implementation of the global protocol for standard care patients aiming to cease the infection spread. Evaluating the potency of these therapy courses has drawn particular attention in health practice. This observational study aimed to assess the efficacy of Remdesivir and Favipiravir drugs compared to the standard care patients in COVID-19 confirmed patients. One hundred twenty-seven patients showed the disease at different stages, and one hundred and fifty patients received only standard care as a control group were included in this study. Patients under the Remdesivir therapy protocol were (62.20%); meanwhile, there (30.71
... Show MoreThe present work involved two steps: the first step include Mannich reaction was carried out on 2- mercaptobenzimidazole using formaldehyde and different secondary amine or amide to gives the compounds(2-16). The secnd step include preparation of (Ethylbenzimidazoly-2-mercaptoacetate)(17) from the reaction of 2- mercaptobenzimidazole with ethylchloroacetate than prepared hydrazide derivative[18]from reaction of compound(17) with hydrazinehydrate. Followed Preparation of shiff bases(19-24) and there reaction with mercaptoacetic acid to give a new compounds containing thiazolidinderivetives(25-30).Structure confirmation of all prepared compound were proved using FTIR and element analysis (C.H.N.S) and mesurmentedmelting poi
... Show MoreThe clinical response to natalizumab in patients with multiple sclerosis (MS) may be significantly influenced by genetic variation. Mutations in genes related to the drug’s mechanism of action or the pathological milieu of MS can contribute substantially to interindividual differences in treatment outcomes. This review aims to provide an overview of previous studies that have examined genetic polymorphisms associated with the clinical efficacy of natalizumab. A systematic literature search was conducted across the PubMed, Google Scholar, and ResearchGate databases using targeted keywords relevant to the subject matter. Several genetic loci were found to be linked to natalizumab responsiveness, including the integrin subunit alpha 4 (ITGA4
... Show MoreThis research proposes the application of the dragonfly and fruit fly algorithms to enhance estimates generated by the Fama-MacBeth model and compares their performance in this context for the first time. To specifically improve the dragonfly algorithm's effectiveness, three parameter tuning approaches are investigated: manual parameter tuning (MPT), adaptive tuning by methodology (ATY), and a novel technique called adaptive tuning by performance (APT). Additionally, the study evaluates the estimation performance using kernel weighted regression (KWR) and explores how the dragonfly and fruit fly algorithms can be employed to enhance KWR. All methods are tested using data from the Iraq Stock Exchange, based on the Fama-French three-f
... Show MoreAbstract
In this research, a study of the behavior and correlation between sunspot number (SSN) and solar flux (F10.7) have been suggested. The annual time of the years (2008-2017) of solar cycle 24 has been adopted to make the investigation in order to get the mutual correlation between (SSN) and (F10.7). The test results of the annual correlation between SSN & F10.7 is simple and can be represented by a linear regression equation. The results of the conducted study showed that there was a good fit between SSN and F10.7 values that have been generated using the suggested mutual correlation equation and the observed data.
With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show More