Preferred Language
Articles
/
jcofarts-862
Simulation of myths in industrial product design "the seven eyes amulet as a model"
...Show More Authors

The research is to identify the legend of the seven eyes amulet of Babylonian origin and the representations it carried of the link between the Babylonian past and the Islamic present presented in the design works of the promoted products, preserving its impact in the souls as a way to avoid the act of envy, and from this was the research problem that I want to get answers to, which That is (How was the legend of the seven-eyes amulet represented in the design of industrial products?), making its goal to identify how that legend was represented within the design work of marketed industrial products, and in order to reach the answer, the research presented many concepts starting with the legend in its various forms in industrial products. , and to identify the meaning of representation or simulation in design. From it, the researcher was able to reach the analytical axes to get the answer through the three deliberately selected samples, leading to the results. The most important thing in it is that all the samples were clear in expression and focus on the subject of the amulet is apparent in the samples. As for the representation, the means were clearly present, and the topics were represented in a relative manner, while the method of representation was fully realized. The most important conclusions were the Iraqi origin of the legend of the amulet, which was the focus of the focus in the overall construction of the design. As for the representations, the basis was to confirm the authenticity of its Iraqi origin and try to combine the concept of Babylonian envy and what it corresponds to in the subject within Islamic teachings

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Reasons modern and contemporary applications social and political engineering in the west
...Show More Authors

The results of the historical review of social and political realities in general show that the practical and procedural applications of social engineering as a particular activity primarily of the social and political characteristics of man and society emerged in modern Western societies before appearing in other societies, These results also show that the emergence of these practical reasons and their applications in the West has also seen the emergence of modern theoretical foundations there, which seems to be the usual and usual context everywhere and in most or not all areas of life. Since the social and political dimensions are intertwined in human life and are in full, comprehensive and lasting harmony, interest in this geometry h

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Engineering
A GENERAL VELOCITY PROFILE FOR A LAMINAR BOUNDARY LAYER OVER FLAT PLATE WITH ZERO INCIDENCE
...Show More Authors

A general velocity profile for a laminar flow over a flat plate with zero incidence is obtained by employing a new boundary condition to the other available boundary conditions. The general velocity profile is mathematically simple and nearest to the exact solution. Also other related values, boundary layer thickness, displacement thickness, momentum thickness and coefficient of friction are nearest to the exact solution compared with other corresponding values for other researchers.

View Publication Preview PDF
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Link Failure Recovery for a Large-Scale Video Surveillance System using a Software-Defined Network
...Show More Authors

The software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem.  The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Oct 01 2011
Journal Name
Journal Of Engineering
A GENERAL VELOCITY PROFILE FOR A LAMINAR BOUNDARY LAYER OVER FLAT PLATE WITH ZERO INCIDENCE
...Show More Authors

A general velocity profile for a laminar flow over a flat plate with zero incidence is obtained by employing a new boundary condition to the other available boundary conditions. The general velocity profile is mathematically simple and nearest to the exact solution. Also other related values, boundary layer thickness, displacement thickness, momentum thickness and coefficient of friction are nearest to the exact solution compared with other corresponding values for other researchers.

View Publication Preview PDF
Crossref
Publication Date
Wed Aug 24 2022
Journal Name
European Journal Of Research Development And Sustainability
MONKEYPOX A NEW PANDEMIC DISEASE: IMPLICATIONS FOR CLINICAL PRACTICE AND PUBLIC HEALTH EDUCATION. A REVIEW
...Show More Authors

Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Impact germination in the content of the chemical components of Homs and sensory qualities of Biskt plant it,
...Show More Authors

This study was conducted to identify the impact of germination in the ratio Almaah of Chemical Constituents of Homs and in the organoleptic properties of the Biskt plant it and compare the results with the treatment control (seeds Almnepth) Adhrt results for a significant increase in the percentage of crude protein with the progress of the process of germination, reaching 24.5% in percentage of crude protein with the progress of the germination process Krbu hydrate college during the germination period, reaching 59.2% in the fourth day

View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
The effect of temperature and density of different host spam in efficiency and performance life of the intruder
...Show More Authors

Studied competence spam to malicious moth figs at temperatures and Kagafat host different results showed that female intruder, despite their ability to shell larvae host and when densities of different, but it is able to lay eggs at a temperature of 14 + or -1 and finally urged the efficiency spam to malicious affected heavily host and that the greater the intensity of the host spam increased efficiency and its performance life

View Publication Preview PDF
Publication Date
Mon Jan 02 2023
Journal Name
Pakistan Heart Jornal
The Effect of the Strategy of Differentiated Education According to the Auditory Learning Style by Using Assistance in Learning the Back Kick (T-Chagi) for the Young Players of …
...Show More Authors

Publication Date
Tue Dec 01 2020
Journal Name
Gulf Economist
The Bayesian Estimation in Competing Risks Analysis for Discrete Survival Data under Dynamic Methodology with Application to Dialysis Patients in Basra/ Iraq
...Show More Authors

Survival analysis is one of the types of data analysis that describes the time period until the occurrence of an event of interest such as death or other events of importance in determining what will happen to the phenomenon studied. There may be more than one endpoint for the event, in which case it is called Competing risks. The purpose of this research is to apply the dynamic approach in the analysis of discrete survival time in order to estimate the effect of covariates over time, as well as modeling the nonlinear relationship between the covariates and the discrete hazard function through the use of the multinomial logistic model and the multivariate Cox model. For the purpose of conducting the estimation process for both the discrete

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
The Rights of the Non-Muslims During the Rule of the Prophet Mohammed and Rashidians Succession Theoretically With Historical Witnesses
...Show More Authors

(Thimma) in Arabic means compact, and immunity. (People of Thimma) are the free non-Muslim people under Muslim rule. This includes Heavenly Religions people, i. e., Christian and Jews).
They have been called (People of Thimma) because they had paid (Jizyah: tribute) so they became safe for their souls, honor, properties at the custody of Muslims.
Islamic law had posed (Jizyah: tribute) upon the Jews and Christians who were living under Muslim rule as a reaction of not embracing Islam Faith against securing their rights and freedom.
Freedoms secured by Islam for the (People of Thimma) had been many, including the right of faith, not coercing them to be Muslim, the right to live, to possess properties, protect and secure them, the

... Show More
View Publication Preview PDF