Praise be to God, Lord of the worlds, and prayers and peace be upon our master Muhammad and upon his family and companions.
And after:
The research dealt with an important and critical era in the history of the Seljuk State of the Romans in Asia Minor, as that country, after the assumption of Sultan Ghiath al-Din Kehsaru II in the year 634 AH / 1236 CE, was subjected to the constant Mongol threat, so the research came marked with (the Seljuk State of Rome in Asia Minor and the Mongol invasion 634 - 708 AH / 1236 - 1308 AD) The research showed the succession of the Seljuk Sultans to the rulers whose rule after the death of Sultan Alaeddin Kikbad was weak and subject to the authority of the Mongols and the conflict of the sons among them over the throne of the Seljuk Sultanate, and to clarify the dispute that occurred between Izz al-Din Kikaus and his brother Rukn al-Din Qulayj Arslan Izz al-Din took refuge in Constantine The discussion dealt with the understanding and alliance between the Turks of Asia Minor and the Mamluk sultans in Cairo with the intention of confronting the common Mongol enemy. The relations of that country with the Abbasid Caliphate and the neighboring countries of the Khwarizmites and the Ayyubids were discussed.
The research dealt with the Mongol threat to the Sultans of the Seljuk state, as their country visited the Tatar forces and fought with them important battles, the most famous of which was the Battle of Kusa Dag
That ended with the victory of the Mongol forces over the Seljuks of the Romans in the year 640 AH / 1242 CE.
The research touched on the end of that country after the death of their last sultans Sultan Masud bin Izz al-Din Kikaus Masoud II, so the rule of the Seljuks in Asia Minor ended, which resulted in the emergence of a large number of Turkish Emirates on the ruins of the Sultanate of Rum in the year 708 AH / 1308 CE.
Autonomous motion planning is important area of robotics research. This type of planning relieves human operator from tedious job of motion planning. This reduces the possibility of human error and increase efficiency of whole process.
This research presents a new algorithm to plan path for autonomous mobile robot based on image processing techniques by using wireless camera that provides the desired image for the unknown environment . The proposed algorithm is applied on this image to obtain a optimal path for the robot. It is based on the observation and analysis of the obstacles that lying in the straight path between the start and the goal point by detecting these obstacles, analyzing and studying their shapes, positions and
... Show MoreThis research presents an experimental investigation on the influence of metakaolin replacement percentage upon some properties of different concrete types. Three types of concrete were adopted (self- compacted concrete, high performance concrete and reactive powder concrete) all of high sulphate (SO3) percentage from the fine aggregate weight, 0.75%. Three percentages of metakaolin replacement were selected to be studied (5, 7 and 10) %. Three types of concrete properties (compressive, flexural and splitting tensile strength) were adopted to achieve better understanding for the influence of adding metakaolin.. The output results indicated that the percentage of metakaolin had a different level of positive effect on the compressive strength
... Show MoreThe usage of remote sensing techniques in managing and monitoring the environmental areas is increasing due to the improvement of the sensors used in the observation satellites around the earth. Resolution merge process is used to combine high resolution one band image with another one that have low resolution multi bands image to produce one image that is high in both spatial and spectral resolution. In this work different merging methods were tested to evaluate their enhancement capabilities to extract different environmental areas; Principle component analysis (PCA), Brovey, modified (Intensity, Hue ,Saturation) method and High Pass Filter methods were tested and subjected to visual and statistical comparison for evaluation. Both visu
... Show MoreIntroduction: All-ceramic crowns are widely used in prosthodontics and cosmetic dentistry due to their good esthetic and proper physical properties. Chipping of ceramic is one of the most common post-insertion complications, that can be fixed either extraoral or intraorally. The latter is time time-effective alternative, less traumatic, and low-cost. A newer objective method of laser is a surface modification of ceramics to increase surface roughness. The aim of this study is to provide a review of Er,Cr;YSGG (2960nm) in intraoral repair and shear bond strength (SBS). Method: A thorough search considering Google Scholar and PubMed published data and ten articles found wh
... Show MoreIncreasing world demand for renewable energy resources as wind energy was one of the goals behind research optimization of energy production from wind farms. Wake is one of the important phenomena in this field. This paper focuses on understanding the effect of angle of attack (α) on wake characteristics behind single horizontal axis wind turbines (HAWT). This was done by design three rotors different from each other in value of α used in the rotor design process. Values of α were (4.8˚,9.5˚,19˚). The numerical simulations were conducted using Ansys Workbench 19- Fluent code; the used turbulence model was (k-ω SST). The results showed that best value for extracted wind energy was at α=19˚, spread distance of wak
... Show MoreThis paper deals with a new Henstock-Kurzweil integral in Banach Space with Bilinear triple n-tuple and integrator function Ψ which depends on multiple points in partition. Finally, exhibit standard results of Generalized Henstock - Kurzweil integral in the theory of integration.
An image retrieval system is a computer system for browsing, looking and recovering pictures from a huge database of advanced pictures. The objective of Content-Based Image Retrieval (CBIR) methods is essentially to extract, from large (image) databases, a specified number of images similar in visual and semantic content to a so-called query image. The researchers were developing a new mechanism to retrieval systems which is mainly based on two procedures. The first procedure relies on extract the statistical feature of both original, traditional image by using the histogram and statistical characteristics (mean, standard deviation). The second procedure relies on the T-
... Show MoreIn this paper, we study a new concept of fuzzy sub-module, called fuzzy socle semi-prime sub-module that is a generalization the concept of semi-prime fuzzy sub-module and fuzzy of approximately semi-prime sub-module in the ordinary sense. This leads us to introduce level property which studies the relation between the ordinary and fuzzy sense of approximately semi-prime sub-module. Also, some of its characteristics and notions such as the intersection, image and external direct sum of fuzzy socle semi-prime sub-modules are introduced. Furthermore, the relation between the fuzzy socle semi-prime sub-module and other types of fuzzy sub-module presented.
In this paper, some commonly used hierarchical cluster techniques have been compared. A comparison was made between the agglomerative hierarchical clustering technique and the k-means technique, which includes the k-mean technique, the variant K-means technique, and the bisecting K-means, although the hierarchical cluster technique is considered to be one of the best clustering methods. It has a limited usage due to the time complexity. The results, which are calculated based on the analysis of the characteristics of the cluster algorithms and the nature of the data, showed that the bisecting K-means technique is the best compared to the rest of the other methods used.
NS-2 is a tool to simulate networks and events that occur per packet sequentially based on time and are widely used in the research field. NS-2 comes with NAM (Network Animator) that produces a visual representation it also supports several simulation protocols. The network can be tested end-to-end. This test includes data transmission, delay, jitter, packet-loss ratio and throughput. The Performance Analysis simulates a virtual network and tests for transport layer protocols at the same time with variable data and analyzes simulation results based on the network simulator NS-2.