Most of the propositions and researches that dealt with fashions in the Middle East, specifically this region from the world, from a historical perspective have not been sufficient, and were characterized by many aspects of immature thinking, in addition, they have been varied in quality. This can be attributed to many factors including: the focus in the field of researches and Middle East studies is on languages, arts, history, and political thinking of the region. Other factors are the information asymmetry, the differences in sources and references, in addition to differences in the scientific value of these sources added to the difficulty of gathering them at the same time especially that these sources are scattered in many places whether in the literary and non-literary texts written with many Middle Eastern languages.
Starting from this standpoint, this study seeks to address the topic of hijab and burqa from the Islamic perspective from a historical analytical viewpoint and their influence in the Islamic fashion system and their development over successive historical periods within certain geographical frameworks, as they are part of the Islamic dress code, let alone being influenced by social, religious, aesthetic, economic and political levels according to the reflection standards on the spirit of the society over the years, based on a group of Islamic documents, manuscripts drawings and paintings, in addition to some important documents about Arab clothes and fashions in the manuscripts, paintings and ornamental pictures, as well as the illustrations in the Arab books that date back to the period between 5thc. and 20th c.
From this standpoint, this study seeks to address the topic of the “AL- Burqaa” and the veil in the Islamic perspective, from a historical and analytical point of view, and its impact on the Islamic system and its development through successive historical periods in certain geographical frameworks, as part of the Islamic clothing system, as well as its influence on social, or religious levels , Or aesthetic, economic and political, according to the criteria of reflection on the spirit of society over the years. Depending on a set of documents, manuscripts, drawings, and Islamic paintings, as well as some important data on Arab clothing and fashion in manuscripts, paintings, and decorative pictures, and illustrations found in Arabic books dating back to the period between the fifth century and the twentieth century AD. Among urban and rural residents, or in different societies and social groups, whether Arabs or Muslims.
Background: Several infectious lung diseases often develop in patients with Rheumatoid arthritis (RA), especially during immunosuppressive medication, including disease-modifying anti-rheumatic drugs (DMARDs). The present study aimed to determine the role of respiratory tract bacterial infection in RA activity. Methods: Blood and sputum samples were collected from 31 patients with RA and 12 healthy subjects as control. The bacterial isolates were isolated and identified in collected sputum by biochemical tests and Vitec 2 system. Results: In the present study, thirty-one patients with RA were compared with 12 healthy subjects. Eight patients with RA were not infected with pathogenic bacteria (RA-NIPB) (25.8%). Twenty-three RA patients wer
... Show MoreThis study focuses on the implementation of interfaces for human machine interaction (HMI) control and monitor automatic production line. The automatic production line can performance feeding, transportation, sorting functions. The objectives of this study are implemented two SCADA/HMI system using two different software. TIA portal software is used to build HMI, alarm, and trends in touch panel which is helped an operator to control and monitor the production line. LabVIEW software is used to build HMI and trends in the computer screen and is linked with Microsoft Excel (ME) to generate information table helped to monitor the performance of the pneumatic equipment. The production line can do performance feeding, transportation, sorting fun
... Show MoreThe A2?u-X1?g+ emission band system of 7LiH1 molecule has been calculated for Lambda doubling. The relation between wave number ?p , ?Q , ?R conducted the energies of the state of rotation F (J), and (J + 1) with rotational quantum number J, respectively, of 7LiH1 molecule for statehood A2?u using the rotation, fixed vibrational states of both the ground and raised crossovers vibrational against ???= 0 to V ' = 0-4using rotational levels J = 0 to J = 20 have found.
An approximate solution of the liner system of ntegral cquations fot both fredholm(SFIEs)and Volterra(SIES)types has been derived using taylor series expansion.The solusion is essentailly
The insulation system of a machine coil includes several layers made of materials with different characteristics. The effective insulation design of machine coils, especially in the machine end winding, depends upon an accurate model of the stress grading system. This paper proposes a modeling approach to predict the transient overvoltage, electric field, and heat generation in machine coils with a stress grading system, considering the variation of physical properties in the insulation layers. A non-uniform line model is used to divide the coil in different segments based on material properties and lengths: overhang, stress grading and slot. The cascaded connection of chain matrices is used to connect segments for the representation of the
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreThe goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
In this work Laser wireless video communication system using intensity modualtion direct
detection IM/DD over a 1 km range between transmitter and receiver is experimentally investigated and
demonstrated. Beam expander and beam collimeter were implemented to collimete laser beam at the
transmitter and focus this beam at the receiver respectively. The results show that IM/DD communication
sysatem using laser diode is quite attractive for transmitting video signal. In this work signal to noise
ratio (S/N) higher than 20 dB is achieved in this work.
Rate of penetration plays a vital role in field development process because the drilling operation is expensive and include the cost of equipment and materials used during the penetration of rock and efforts of the crew in order to complete the well without major problems. It’s important to finish the well as soon as possible to reduce the expenditures. So, knowing the rate of penetration in the area that is going to be drilled will help in speculation of the cost and that will lead to optimize drilling outgoings. In this research, an intelligent model was built using artificial intelligence to achieve this goal. The model was built using adaptive neuro fuzzy inference system to predict the rate of penetration in
... Show MoreThe avoidance strategy of prey to predation and the predation strategy for predators are important topics in evolutionary biology. Both prey and predators adjust their behaviors in order to obtain the maximal benefits and to raise their biomass for each. Therefore, this paper is aimed at studying the impact of prey’s fear and group defense against predation on the dynamics of the food-web model. Consequently, in this paper, a mathematical model that describes a tritrophic Leslie-Gower food-web system is formulated. Sokol-Howell type of function response is adapted to describe the predation process due to the prey’s group defensive capability. The effects of fear due to the predation process are considered in the first two levels
... Show More