Most of the mosques in the Islamic world fall under specific and known forms and patterns to a large extent, and such patterns have grown and evolved from the few basic and uniform models, but they changed slowly due to the impact with a mixture of changing functional requirements and cultural landscapes because of the variables of time and place to form patterns known and famous in this day across parts of the Islamic world and its borders. There was no exception to these patterns, but small numbers of mosques that were probably the result of personal experiences or improvisational resolutions, or in response to specific or temporary stimuli. However, the emergence of a specific pattern which does not belong to any of these patterns, but opposes it in founded design and planning, and the spread of this new style - surprisingly - in a vast area, and its appearance clearly and strikingly , is really visible phenomenon worthy of attention, study and investigation. The emergence of the problem of this research is by observing a specific pattern of the mosques characterized by differences evident in the features of the general planning - a combination of the distribution of events in the schemes of the mosques - and the details of architectural form - external and internal – and its functional formation such as the nature related to functional components of those mosques with each other which distinguish this style of mosques of any known pattern of common patterns of mosques throughout the world, and the Islamic world in particular, and within a certain area which is province of Sulaymaniyah, and in particular its position and a specific time period which lasted for two or three decades. Hence the idea of this research to study the pattern of an updated planning and architecture of mosques bearing the features that distinguish them from normal patterns of mosques, as this work attempts to ascertain the causes and variables that called for the emergence of such a pattern, assuming a range of cultural influences and natural reasons for this phenomenon based on the study of models and samples selected randomly from those mosques in the period of time specified by the search for the consideration of the statistical implications on one hand and the study of the determinants of design in those models on the other hand and that to know the most influential elements in causing these changes that generated the problem of this research which led to the emergence of this un ique style that characterized the mosques of this region from other mosques in the Islamic world.
In this study, a cholera model with asymptomatic carriers was examined. A Holling type-II functional response function was used to describe disease transmission. For analyzing the dynamical behavior of cholera disease, a fractional-order model was developed. First, the positivity and boundedness of the system's solutions were established. The local stability of the equilibrium points was also analyzed. Second, a Lyapunov function was used to construct the global asymptotic stability of the system for both endemic and disease-free equilibrium points. Finally, numerical simulations and sensitivity analysis were carried out using matlab software to demonstrate the accuracy and validate the obtained results.
Iraq has suffered since 1991 from international sanctions imposed on it by the dictatorial regime that existed at the time, invading Kuwait, which led to the decline of the status of Iraq and the isolation of international and regional (Arab) and clear Iraq as a strange entity living within its regional environment, after April 2003 did not change much In fact, there were no signs of détente before the Arab League summit in Baghdad in 2011, and the signs of a break in the stalemate in inter-relations over the past years have become evident. Disruption and refraction was not high (Islamic Republic of Iran, Turkey, Syrian Arab Republic, Hashemite Kingdom of Jordan, Saudi Arabia, Kuwait). Each side is governed by perceptions about Iraq, es
... Show MoreNimodipine (NMD) is a dihydropyridine calcium channel blocker useful for the prevention and treatment of delayed ischemic effects. It belongs to class ? drugs, which is characterized by low solubility and high permeability. This research aimed to prepare Nimodipine nanoparticles (NMD NPs) for the enhancement of solubility and dissolution rate. The formulation of nanoparticles was done by the solvent anti-solvent technique using either magnetic stirrer or bath sonicator for maintaining the motion of the antisolvent phase. Five different stabilizers were used to prepare NMD NPs( TPGS, Soluplus®, HPMC E5, PVP K90, and poloxamer 407). The selected formula F2, in which Soluplus
has been utilized as a stabilizer, has a par
... Show MoreA New Perspective About Masculinity and the Issue of Identity in Ernest Hemingway's The Old Man and The Sea and Michael Ondaatje's in The Skin of a lion
Background: Complete seal of the root canal system following its chemo-mechanical debridement plays a pivotal role for achieving successful endodontic treatment. This can be established by reducing the gaps between the core filling material and root canal wall. Aim: To assess and compare the dislocation resistance of root canals obturated with GuttaFusion® and TotalFill BC sealer versus single cone obturation technique and TotalFill BC sealer after instrumentation of the canals with WaveOne, ProTaper Next and ProTaper Universal system. Material and Method: Sixty extracted human permanent mandibular premolars were conducted in the current study. The teeth were decorated and left the root with 15mm length; the roots were divided randomly i
... Show MoreAbstract The present work aims to study the performance of reinforced compacted clay soil by sand columns stabilized with sodium silicate to obtain more solid columns than the surrounding soil. The experimental work was carried out by using a lab model to evaluate the performance of both the floating and end bearing sand columns. The results showed that the improvement ratio for the soil reinforced with sand columns stabilized with sodium silicate reached 390% for the type of floating columns and 438% for end bearing columns.
Seeds, beans, leaves, fruit peel and seeds of five plants (Ferula assa-foetida, Coffea robusta, Olea europaea, Punica granatum and Vitis vinifera, respectively) were extracted with four solvents (distilled water, 80% methanol, 80% acetone and a mixed solvent that included methanol, ethanol, acetone and n-butanol at proportions 7:1:1:1). Such manipulation yielded 20 extracts, which were phytochemically analyzed for total polyphenols (TP) and flavonoids (TF). The DPPH (2,2-diphenyl-1-picrylhydrazyl) radical scavenging activity (RSA) and DPP-4 (dipeptidyl peptidase-4) relative inhibition activity (RIA) were also assessed for each extract. The results revealed that mixed solvent extract of V.
... Show MoreIt was found that there was a significant correlation between all tests of the mechanical and electrical activity of the heart (systolic force FC, stroke volume SV, end-diastolic volume, EF volume, and left ventricular volume during diastole LVDD) with the test of the oxygen-phosphating energy system (Markaria). - As safe (Margaria-Kalamen( It was found that there is a significant correlation between all tests of the mechanical and electrical activity of the heart (myocardial systolic force FC, stroke volume SV, end-diastolic volume EDV, and the percentage of heart pumpingEF blood, and left ventricular volume during diastole (LVDD) with the Lactational Oxygen Energy System Test (Wingate Test 30 Second(
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More