Andalusian women enjoyed much historical news in the fluorescence of Andalusia, describing it as beautiful and good cohabitation, as the men were involved in conquests, including those who were wives of the caliphs, including scientists, singers, and adept writers Hassan and tongue, in addition to the acquisition of masters in slave markets in Cordoba, Seville and many cities, In addition, Andalusian women enjoy freedom in their relationship with men and have been reflected in the historical fluorescence of Andalusia, such as the book of the history of Ibn Abdul Malik bin Habib al-Alberi (d. And the collar of the dove repented in intimacy and thousands of Ibn Hazm al-Qurtubi (d. 456 AH / 1065 CE), the book of Hilla al-Sayra of Ibn al-Wells al-Balansi (d. 658 AH / 1267 CE), and the book of al-Bayan al-Maghrib in the news of al-Andalus and Morocco by Ibn Adhari al-Marakchi (d. Al-Andalus wet branch of al-Muqari (d. 1041 AH / 1650 CE) and others. The status of this woman in Andalusian society, the research material was based on fisheries The research looked at the civilizational situation witnessed by women in Andalusian society, both in customs and traditions, freedom of cohabitation and mixing, and between them and the caliphs of friendliness, influence, and freedom. It was a picture of what happened between the Arab and Spanish elements, as many values melted. Arab customs in front of the beauty and nature of Andalusian women have won women good and beauty and created a prominent place in the bureaus of Andalusian poets and this is embodied in the research, describing the most beautiful descriptions of fiction, which reflected the poem pictures of history of this woman.
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreIn this article, the casting method was used to prepare poly(methyl methacrylate)/hydroxyapatite (PMMA/HA) nanocomposite films incorporated with different contents (0.5, 1, and 1.5 wt%) of graphene nanoplatelets (Gnp). The chemical properties and surface morphology of the PMMA/HA blend and PMMA/HA/Gnp nanocomposite were characterized using FTIR, and SEM analysis. Besides, the thermal conductivity, dielectric and electrical properties at (1–107 Hz) of the PMMA/HA blend and PMMA/HA/Gnp composites were investigated. The structural analysis showed that the synthesized composites had a low agglomerated state, with multiple wrinkles of graphene flakes in the PMMA/HA blend. The thermal conductivity was improved by more than 35-fold its value for
... Show MoreThe current study deals with the performance of constructed wetland (CW) incorporating a microbial fuel cell (MFC) for wastewater treatment and electricity generation. The whole unit is referred to as CW-MFC. This technique involves two treatments; the first is an aerobic treatment which occurs in the upper layer of the system (cathode section) and the second is anaerobic biological treatment in the lower layer of the system (anode section). Two types of electrode material were tested; stainless steel and graphite. Three configurations for electrodes arrangement CW-MFC were used. In the first unit of CW-MFC, the anode was graphite plate (GPa) and cathode was also graphite plate (GPc), in the second CW-MFC unit, the anode was stainless st
... Show MoreAbstract
Praise be to Allah and prayers and peace be upon our Prophet, Muhammad, his family and all of his companions,
This research addresses the issue of judge's preaching to the litigants and witnesses; it is a very significant issue since the judge cannot know the insides and facts, but it issues judgments based on the hearings. Since people are originally wrong-doing and ignorant, they, therefore, commit injustice, oppression, false adversarial, and false testimony. However, some people can possibly retreat and return to the right, after being inattentive or recalcitrant, by preaching. This fact led scholars to talk about the judge's preaching to litigant and witnesses and this research is conducted
... Show MoreThis study was to examine the effect of a mental training program, including a combination of autogenic training and imagery, on a number of mental skills and on the development of personality traits-psychological hardiness as well as conscientiousness, openness to experience, and neuroticism-in Adolescent male volleyball players. 60 adolescent male volleyball players (aged 15–17) participated in a two-group, pretest-posttest design. The experimental group (n = 30) completed 8-week mental skills training program, including imagery, self-talk, attention control, and relaxation, while the control group (n = 30) followed regular training. Psychological hardiness and selected personality traits were measured pre-and post-intervention using va
... Show MoreThyroid disease is a common disease affecting millions worldwide. Early diagnosis and treatment of thyroid disease can help prevent more serious complications and improve long-term health outcomes. However, thyroid disease diagnosis can be challenging due to its variable symptoms and limited diagnostic tests. By processing enormous amounts of data and seeing trends that may not be immediately evident to human doctors, Machine Learning (ML) algorithms may be capable of increasing the accuracy with which thyroid disease is diagnosed. This study seeks to discover the most recent ML-based and data-driven developments and strategies for diagnosing thyroid disease while considering the challenges associated with imbalanced data in thyroid dise
... Show MoreSeparation of Trigonelline, the major alkaloid in fenugreek seeds, is difficult because the extract of these seeds usually contains Trigonelline, choline, mucilage, and steroidal saponins, in addition to some other substances. This study amis to isolate the quaternary ammonium alkaloid (Trigonelline) and choline from fenugreek seeds (Trigonella-foenum graecum L.) which have similar physiochemical properties by modifying of the classical method. Seeds were defatted and then extracted with methanol. The presence of alkaloids was detected by using Mayer's and Dragendorff's reagents. In this work, trigonilline was isolated with traces of choline by subsequent processes of purification using analytical and preparative TLC techniques.
... Show MoreDiabetic retinopathy is one of most important complications of diabetes mellitus that can be treated by Nd:YAG laser. Laser is used in ophthalmic practice for photocoagulation and photodisruption. The purpose of this study is to evaluate changes in immunological ,hematological and biochemical values after treatment of diabetic retinopathy by laser. Blood samples from 10 patients suffering from diabetic retinopathy were taken before and after laser treatment to coagulate retina to prevent leakage and hemorraghe to avoid deterioration of vision.In group one (4 patients = 40%), blood tests were done one day after treatment. In group two (6 patients =60%) tests were done 7 days after treatment with laser. The study showed no clear changes in
... Show MoreMetaheuristics under the swarm intelligence (SI) class have proven to be efficient and have become popular methods for solving different optimization problems. Based on the usage of memory, metaheuristics can be classified into algorithms with memory and without memory (memory-less). The absence of memory in some metaheuristics will lead to the loss of the information gained in previous iterations. The metaheuristics tend to divert from promising areas of solutions search spaces which will lead to non-optimal solutions. This paper aims to review memory usage and its effect on the performance of the main SI-based metaheuristics. Investigation has been performed on SI metaheuristics, memory usage and memory-less metaheuristics, memory char
... Show More