Praise be to God, Lord of the worlds, and prayers and peace be upon our master Muhammad and upon his family and companions.
And after:
The research dealt with an important and critical era in the history of the Seljuk State of the Romans in Asia Minor, as that country, after the assumption of Sultan Ghiath al-Din Kehsaru II in the year 634 AH / 1236 CE, was subjected to the constant Mongol threat, so the research came marked with (the Seljuk State of Rome in Asia Minor and the Mongol invasion 634 - 708 AH / 1236 - 1308 AD) The research showed the succession of the Seljuk Sultans to the rulers whose rule after the death of Sultan Alaeddin Kikbad was weak and subject to the authority of the Mongols and the conflict of the sons among them over the throne of the Seljuk Sultanate, and to clarify the dispute that occurred between Izz al-Din Kikaus and his brother Rukn al-Din Qulayj Arslan Izz al-Din took refuge in Constantine The discussion dealt with the understanding and alliance between the Turks of Asia Minor and the Mamluk sultans in Cairo with the intention of confronting the common Mongol enemy. The relations of that country with the Abbasid Caliphate and the neighboring countries of the Khwarizmites and the Ayyubids were discussed.
The research dealt with the Mongol threat to the Sultans of the Seljuk state, as their country visited the Tatar forces and fought with them important battles, the most famous of which was the Battle of Kusa Dag
That ended with the victory of the Mongol forces over the Seljuks of the Romans in the year 640 AH / 1242 CE.
The research touched on the end of that country after the death of their last sultans Sultan Masud bin Izz al-Din Kikaus Masoud II, so the rule of the Seljuks in Asia Minor ended, which resulted in the emergence of a large number of Turkish Emirates on the ruins of the Sultanate of Rum in the year 708 AH / 1308 CE.
This study is aimed to Green-synthesize and characterize Al NPs from Clove (Syzygium aromaticum
L.) buds plant extract and to investigate their effect on isolated and characterized Salmonella enterica growth.
S. aromaticum buds aqueous extract was prepared from local market clove, then mixed with Aluminum nitrate
Al(NO3)3. 9 H2O, 99.9% in ¼ ratio for green-synthesizing of Al NPs. Color change was a primary confirmation
of Al NPs biosynthesis. The biosynthesized nanoparticles were identified and characterized by AFM, SEM,
EDX and UV–Visible spectrophotometer. AFM data recorded 122nm particles size and the surface roughness
RMs) of the pure S. aromaticum buds aqueous extract recorded 17.5nm particles s
An image retrieval system is a computer system for browsing, looking and recovering pictures from a huge database of advanced pictures. The objective of Content-Based Image Retrieval (CBIR) methods is essentially to extract, from large (image) databases, a specified number of images similar in visual and semantic content to a so-called query image. The researchers were developing a new mechanism to retrieval systems which is mainly based on two procedures. The first procedure relies on extract the statistical feature of both original, traditional image by using the histogram and statistical characteristics (mean, standard deviation). The second procedure relies on the T-
... Show MoreData-driven models perform poorly on part-of-speech tagging problems with the square Hmong language, a low-resource corpus. This paper designs a weight evaluation function to reduce the influence of unknown words. It proposes an improved harmony search algorithm utilizing the roulette and local evaluation strategies for handling the square Hmong part-of-speech tagging problem. The experiment shows that the average accuracy of the proposed model is 6%, 8% more than HMM and BiLSTM-CRF models, respectively. Meanwhile, the average F1 of the proposed model is also 6%, 3% more than HMM and BiLSTM-CRF models, respectively.
A checklist of the wild mammals of Syria including their current status and geographical distribution is provided. Data related to 110 mammalian species were collected following a comprehensive review of available literature records, grey data, and online observations combined with photographic evidence and in situ surveys carried out between 2006 and 2023. The checklist comprises seven orders, 36 families, 73 genera (subgenera), and 110 species, and includes data on 15 globally threatened species of wild mammals. Overall, we report up-to-date information on taxonomic revisions, historical and current geographical range, as well as the conservation status recently assessed by the International Union for Conservation of Nature (IUCN)
... Show MoreIn this paper, we study a new concept of fuzzy sub-module, called fuzzy socle semi-prime sub-module that is a generalization the concept of semi-prime fuzzy sub-module and fuzzy of approximately semi-prime sub-module in the ordinary sense. This leads us to introduce level property which studies the relation between the ordinary and fuzzy sense of approximately semi-prime sub-module. Also, some of its characteristics and notions such as the intersection, image and external direct sum of fuzzy socle semi-prime sub-modules are introduced. Furthermore, the relation between the fuzzy socle semi-prime sub-module and other types of fuzzy sub-module presented.
Increasing world demand for renewable energy resources as wind energy was one of the goals behind research optimization of energy production from wind farms. Wake is one of the important phenomena in this field. This paper focuses on understanding the effect of angle of attack (α) on wake characteristics behind single horizontal axis wind turbines (HAWT). This was done by design three rotors different from each other in value of α used in the rotor design process. Values of α were (4.8˚,9.5˚,19˚). The numerical simulations were conducted using Ansys Workbench 19- Fluent code; the used turbulence model was (k-ω SST). The results showed that best value for extracted wind energy was at α=19˚, spread distance of wak
... Show MoreNS-2 is a tool to simulate networks and events that occur per packet sequentially based on time and are widely used in the research field. NS-2 comes with NAM (Network Animator) that produces a visual representation it also supports several simulation protocols. The network can be tested end-to-end. This test includes data transmission, delay, jitter, packet-loss ratio and throughput. The Performance Analysis simulates a virtual network and tests for transport layer protocols at the same time with variable data and analyzes simulation results based on the network simulator NS-2.
Let R be a commutative ring with identity and let M be a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of semi-essential submodules which introduced by Ali S. Mijbass and Nada K. Abdullah, and we make simple changes to the definition relate with the zero submodule, so we say that a submodule N of an R-module M is called semi-essential, if whenever N ∩ P = (0), then P = (0) for each prime submodule P of M. Various properties of semi-essential submodules are considered.
In this paper, we introduce an exponential of an operator defined on a Hilbert space H, and we study its properties and find some of properties of T inherited to exponential operator, so we study the spectrum of exponential operator e^T according to the operator T.
Abstract
Machining residual stresses correlate very closely with the cutting parameters and the tool geometries. This research work aims to investigate the effect of cutting speed, feed rate and depth of cut on the surface residual stress of steel AISI 1045 after face milling operation. After each milling test, the residual stress on the surface of the workpiece was measured by using X-ray diffraction technique. Design of Experiment (DOE) software was employed using the response surface methodology (RSM) technique with a central composite rotatable design to build a mathematical model to determine the relationship between the input variables and the response. The results showed that both
... Show More