Praise be to God, Lord of the worlds, and prayers and peace be upon our master Muhammad and upon his family and companions.
And after:
The research dealt with an important and critical era in the history of the Seljuk State of the Romans in Asia Minor, as that country, after the assumption of Sultan Ghiath al-Din Kehsaru II in the year 634 AH / 1236 CE, was subjected to the constant Mongol threat, so the research came marked with (the Seljuk State of Rome in Asia Minor and the Mongol invasion 634 - 708 AH / 1236 - 1308 AD) The research showed the succession of the Seljuk Sultans to the rulers whose rule after the death of Sultan Alaeddin Kikbad was weak and subject to the authority of the Mongols and the conflict of the sons among them over the throne of the Seljuk Sultanate, and to clarify the dispute that occurred between Izz al-Din Kikaus and his brother Rukn al-Din Qulayj Arslan Izz al-Din took refuge in Constantine The discussion dealt with the understanding and alliance between the Turks of Asia Minor and the Mamluk sultans in Cairo with the intention of confronting the common Mongol enemy. The relations of that country with the Abbasid Caliphate and the neighboring countries of the Khwarizmites and the Ayyubids were discussed.
The research dealt with the Mongol threat to the Sultans of the Seljuk state, as their country visited the Tatar forces and fought with them important battles, the most famous of which was the Battle of Kusa Dag
That ended with the victory of the Mongol forces over the Seljuks of the Romans in the year 640 AH / 1242 CE.
The research touched on the end of that country after the death of their last sultans Sultan Masud bin Izz al-Din Kikaus Masoud II, so the rule of the Seljuks in Asia Minor ended, which resulted in the emergence of a large number of Turkish Emirates on the ruins of the Sultanate of Rum in the year 708 AH / 1308 CE.
Let R be a commutative ring with identity and let M be a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of semi-essential submodules which introduced by Ali S. Mijbass and Nada K. Abdullah, and we make simple changes to the definition relate with the zero submodule, so we say that a submodule N of an R-module M is called semi-essential, if whenever N ∩ P = (0), then P = (0) for each prime submodule P of M. Various properties of semi-essential submodules are considered.
The aim of this study was to study chemical constituents of aerial parts of Cardaria draba since no phytochemical investigation had been studied before in Iraq. Aerial parts of Cardaria draba were defatted by maceration in hexane for 72 h. The defatted plant materials were extracted using Soxhlet apparatus, the aqueous Methanol 90% as a solvent extraction for 18 h, and fractionated with petroleum ether- chloroform (CHCl3)- ethylacetate- and n-butanol respectivly. The ethyl acetate, n-butanol, and n-butanol after hydrolysis fractions were investigated by high performance liquid chromatography (HPLC) and thin-layer chromatography (TLC) for its phenolic acid and flavonoid contents. Flavono
... Show MoreThis paper discusses the method for determining the permeability values of Tertiary Reservoir in Ajeel field (Jeribe, dhiban, Euphrates) units and this study is very important to determine the permeability values that it is needed to detect the economic value of oil in Tertiary Formation. This study based on core data from nine wells and log data from twelve wells. The wells are AJ-1, AJ-4, AJ-6, AJ-7, AJ-10, AJ-12, AJ-13, AJ-14, AJ-15, AJ-22, AJ-25, and AJ-54, but we have chosen three wells (AJ4, AJ6, and AJ10) to study in this paper. Three methods are used for this work and this study indicates that one of the best way of obtaining permeability is the Neural network method because the values of permeability obtained be
... Show MoreThe searching process using a binary codebook of combined Block Truncation Coding (BTC) method and Vector Quantization (VQ), i.e. a full codebook search for each input image vector to find the best matched code word in the codebook, requires a long time. Therefore, in this paper, after designing a small binary codebook, we adopted a new method by rotating each binary code word in this codebook into 900 to 2700 step 900 directions. Then, we systematized each code word depending on its angle to involve four types of binary code books (i.e. Pour when , Flat when , Vertical when, or Zigzag). The proposed scheme was used for decreasing the time of the coding pro
... Show MoreFluoroscopic images are a field of medical images that depends on the quality of image for correct diagnosis; the main trouble is the de-nosing and how to keep the poise between degradation of noisy image, from one side, and edge and fine details preservation, from the other side, especially when fluoroscopic images contain black and white type noise with high density. The previous filters could usually handle low/medium black and white type noise densities, that expense edge, =fine details preservation and fail with high density of noise that corrupts the images. Therefore, this paper proposed a new Multi-Line algorithm that deals with high-corrupted image with high density of black and white type noise. The experiments achieved i
... Show MoreOne-third of the total waste generated in the world is construction and demolition waste. Reducing the life cycle of building materials includes increasing their recycling and reuse by using recycled aggregates. By preventing, the need to open new aggregate quarries and reducing the amount of construction waste dumped into landfills, the use of recycled concrete aggregate in drum compacted concrete protects the environment. Four samples of PRCC were prepared for testing (compressive strength, tensile strength, flexural strength, density, water absorption, porosity) as the reference mix and (10, 15, and 20%) of fine recycled concrete aggregate as a partial replacement for fine natural aggregate by volume. The mix is designed according to
... Show MoreThis paper presents an IoT smart building platform with fog and cloud computing capable of performing near real-time predictive analytics in fog nodes. The researchers explained thoroughly the internet of things in smart buildings, the big data analytics, and the fog and cloud computing technologies. They then presented the smart platform, its requirements, and its components. The datasets on which the analytics will be run will be displayed. The linear regression and the support vector regression data mining techniques are presented. Those two machine learning models are implemented with the appropriate techniques, starting by cleaning and preparing the data visualization and uncovering hidden information about the behavior of
... Show MoreIn this work , we study different chaotic properties of the product space on a one-step shift of a finite type, as well as other spaces. We prove that the product is Lyapunove –unstable if and only if at least one or is Lyapunove –unstable. Also, we show that and locally everywhere onto (l.e.o) if and only if is locally everywhere onto (l.e.o) .
In this article, the backstepping control scheme is proposed to stabilize the fractional order Riccati matrix differential equation with retarded arguments in which the fractional derivative is presented using Caputo's definition of fractional derivative. The results are established using Mittag-Leffler stability. The fractional Lyapunov function is defined at each stage and the negativity of an overall fractional Lyapunov function is ensured by the proper selection of the control law. Numerical simulation has been used to demonstrate the effectiveness of the proposed control scheme for stabilizing such type of Riccati matrix differential equations.