Andalusian women enjoyed much historical news in the fluorescence of Andalusia, describing it as beautiful and good cohabitation, as the men were involved in conquests, including those who were wives of the caliphs, including scientists, singers, and adept writers Hassan and tongue, in addition to the acquisition of masters in slave markets in Cordoba, Seville and many cities, In addition, Andalusian women enjoy freedom in their relationship with men and have been reflected in the historical fluorescence of Andalusia, such as the book of the history of Ibn Abdul Malik bin Habib al-Alberi (d. And the collar of the dove repented in intimacy and thousands of Ibn Hazm al-Qurtubi (d. 456 AH / 1065 CE), the book of Hilla al-Sayra of Ibn al-Wells al-Balansi (d. 658 AH / 1267 CE), and the book of al-Bayan al-Maghrib in the news of al-Andalus and Morocco by Ibn Adhari al-Marakchi (d. Al-Andalus wet branch of al-Muqari (d. 1041 AH / 1650 CE) and others. The status of this woman in Andalusian society, the research material was based on fisheries The research looked at the civilizational situation witnessed by women in Andalusian society, both in customs and traditions, freedom of cohabitation and mixing, and between them and the caliphs of friendliness, influence, and freedom. It was a picture of what happened between the Arab and Spanish elements, as many values melted. Arab customs in front of the beauty and nature of Andalusian women have won women good and beauty and created a prominent place in the bureaus of Andalusian poets and this is embodied in the research, describing the most beautiful descriptions of fiction, which reflected the poem pictures of history of this woman.
To accommodate utilities in buildings, different sizes of openings are provided in the web of reinforced concrete deep beams, which cause reductions in the beam strength and stiffness. This paper aims to investigate experimentally and numerically the effectiveness of using carbon fiber reinforced polymer (CFRP) strips, as a strengthening technique, to externally strengthen reinforced concrete continuous deep beams (RCCDBs) with large openings. The experimental work included testing three RCCDBs under five-point bending. A reference specimen was prepared without openings to explore the reductions in strength and stiffness after providing large openings. Openings were created symmetrically at the center of spans of the other specimens
... Show MoreNon-prismatic reinforced concrete (RC) beams are widely used for various practical purposes, including enhancing architectural aesthetics and increasing the overall thickness in the support area above the column, which gives high assurance to services that this will not result in the distortion of construction features and can reduce heights. The hollow sections (recess) can also be used for the maintenance of large structural sections and the safe passage of utility lines of water, gas, telecommunications, electricity, etc. They are generally used in large and complex civil engineering works like bridges. This study conducted a numerical study using the commercial finite element software ANSYS version 15 for analysing RC beams, hol
... Show MoreObjectives The strategies of tissue-engineering led to the development of living cell-based therapies to repair lost or damaged tissues, including periodontal ligament and to construct biohybrid implant. This work aimed to isolate human periodontal ligament stem cells (hPDLSCs) and implant them on fabricated polycaprolactone (PCL) for the regeneration of natural periodontal ligament (PDL) tissues. Methods hPDLSCs were harvested from extracted human premolars, cultured, and expanded to obtain PDL cells. A PDL-specific marker (periostin) was detected using an immunofluorescent assay. Electrospinning was applied to fabricate PCL at three concentrations (13%, 16%, and 20% weight/volume) in two forms, which were examined through field emission
... Show MoreFinite Element Approach is employed in this research work to solve the governing differential equations related to seepage via its foundation's dam structure. The primary focus for this reason is the discretization of domain into finite elements through the placement of imaginary nodal points and the discretization of governing equations into an equation system; An equation for each nodal point or part, and unknown variables are solved. The SEEP / W software (program) is a sub-program of the Geo-Studio software, which is used by porous soil media to compensate for the problems of seepage. To achieve the research goals, a study was carried out on Hemrin dam, which located in the Diyala River 100 km northeast of Baghdad, Iraq. Thus, o
... Show MorePoetic objects may go towards a specific purpose and dissolve and interact with them to produce
A purpose characterized by the title but belongs to the U from afar.
The yarn goes towards praise with a purely horizontal relationship that mentions virtues but crowns them towards women.
In lamentation remember the virtues but crown them towards the dead.
In wisdom remember the virtues but crown them towards time.
In the description remember the virtues but crown them towards nature. All objects are inline
Horizontal We will prove this in the axes of research has required the plan to be a blind, five
The preamble, a brief overview of the life of Dabal All Khuzaie and the works and poets of the first axis
The direction
The aim of the present work to study the effect of changing velocity (Reynold's number) on oxygen cathodic polarization using brass rotating cylinder electrode in 0.1, 0.3 and 0.5N NaCl solutions (PH = 7) at temperatures 40, 50 and 600 C. Cathodic polarization experiments were conducted as a function of electrode rotational speed and concentration.
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More