This research interested to study the structural configuration in the square kufi script, as the kufi script is one of the oldest Arabic fonts, and this name was named according to the city of Kufa, so its types, forms, and designations were numerous, including the square kufic script, which was characterized by being a very straightforward engineering script based on the principle of squaring in building letters to form an engineering body that governs its construction of a set of organizational relationships and design bases according to an engineering structural system. The researchers identified the problem of his research with the following question: What is the Structural configuration in the square Kufic script?
Therefore, the research interested to show the structural configuration in the kufi script, for the period from (1383 AH - 1963 AD) to (1432 AH - 2011 CE), in Iraq.
The second chapter included the theoretical framework, as the first topic dealt with the composition in the square kufic script. And as for the second topic include the structural anchors of the formation in the square kufic script, then followed by indicators of the theoretical framework and previous studies.
The third chapter included research procedures, as the descriptive analytical approach was adopted. The fourth chapter included analyzing the samples, presenting the results, conclusions
This study was conducted to know the effect of some phenotype characteristics of corn plant on infection by (CSB), using 13 genotypes of corn plant, planting during autumn season 1997 and 1998. The result revealed that the mean of plant height (with male flowering) was (183-219) cm, the mean of leaf No./ plant in all genotypes was (16-18) leaf but the leaf area of plant was (4350-6249) cm2, there were significant differences of phenotype characteristics between genotypes ,the percentage of infection by (CSB) was (5.9-35.9),% the result showed that the phenotype characteristics had non effect on the infection percentage by (CSB) and the correlation coefficient was not significant.
The article presents the results of studying the conchological variability of the terrestrial mollusk Chondrulopsina fedtschenkoi (Ancey, 1886), known to occur in three regions of the Zaravshan Range (Central Asia): the Urgutsay Gorge, the vicinity of the Gissarak Reservoir and the Ingichka-Irmak Gorge. Conchological variability was determined based on statistical analysis. The climate of the three regions is different, and environmental factors have led to changes in the mollusk shell. The shells have changed in response to environmental factors, these are their adaptive traits for survival; the variability of conchological features is also reflected in the color of the shell, and the intensive development of the color of the shell in m
... Show MoreThe current study deals with the performance of constructed wetland (CW) incorporating a microbial fuel cell (MFC) for wastewater treatment and electricity generation. The whole unit is referred to as CW-MFC. This technique involves two treatments; the first is an aerobic treatment which occurs in the upper layer of the system (cathode section) and the second is anaerobic biological treatment in the lower layer of the system (anode section). Two types of electrode material were tested; stainless steel and graphite. Three configurations for electrodes arrangement CW-MFC were used. In the first unit of CW-MFC, the anode was graphite plate (GPa) and cathode was also graphite plate (GPc), in the second CW-MFC unit, the anode was stainless steel
... Show MoreThe porosity of materials is important in many applications, products and processes, such as electrochemical devices (electrodes, separator, active components in batteries), porous thin film, ceramics, soils, construction materials, ..etc. This can be characterized in many different methods, and the most important methods for industrial purposes are the N2 gas adsorption and mercury porosimetry. In the present paper, both of these techniques have been used to characterize some of Iraqi natural raw materials deposits. These are Glass Sand, Standard Sand, Flint Clay and Bentonite. Data from both analyses on the different types of natural raw materials deposits are critically examined and discussed. The results of specific surface are
... Show MoreThe meanings attributed to Female Genital Mutilation/Cutting (FGM/C) are shaped through complex negotiations within religious and socio-cultural frameworks, including those observed in Indonesia. Using a combined qualitative and quantitative (mixed methods)-ethnographic and survey approach, data from 109 students of religious tertiary institutions in East Kalimantan on their perspectives on FGM/C practices can be more comprehensively explored. The results of the study, which were analysed using the three principles of symbolic interactionism, showed that 72.5 per cent of religious college student families still practice FGM/C and 53.2 per cent stated that FGM/C practices are beneficial for women. However, they are also willing, if
... Show MoreIn the 1970s, the world knew the long-tailed nesokia Nesokia bunnii (Khajuria, 1981) (Rodentia, Muridae) from the Mesopotamian marshes of Garden of Eden in Southern Iraq. This distinct rodent was known from only five voucher specimens collected at the confluence of Tigris and Euphrates Rivers in southern Iraq while its occurrence in Southwestern Iran had
never been reported. In the 1990s, a large extent of its natural habitat was catastrophically desiccated and the animal was last seen in the 1970s. Since then, the status of this elusive rodent was shrouded in mystery. In 2007, an extraordinary photograph of a carcass of this species came to the light from Hawizeh Marsh which was interpreted as concrete evidence of the species’ pers
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More