أن الطرق اللامعلمية هي نوع من الطرق الاحصائية الاستدلالية التي يمكن استخدامها للتوصل إلى أستنتاجات لذا كان حرص المؤلف على أصدار هذا الكتاب والذي يعمل على توضيح ( لماذا ؟ ومتى ؟ وكيف ؟ ) تستخدم كل طريقة إحصائية . وبإمكان القاريء سواء أكان أستاذا ً جامعيا ً أو باحثا ً أو طالبا ً في الدراسات العليا ( الماجستير والدكتوراه ) أو طالبا ً في الدراسات الأولية أن يتتبع جميع الخطوات لحساب كل قانون إحصائي وبدءا ً من عملية إدخال البيانات وأسلوب أستخراج المعالجات الإحصائية ، وكذلك تتبع تسلسل النوافذ لمحرر البيانات النهائية المستخرجة التي يمكن الحصول عليها أثناء العمل إضافة لتحليلها وكيفية قراءتها وتفسيرها بإستخدام البرنامج الإحصائي الجاهز IBM SPSS Version 24 معززا ً ذلك بمثال تطبيقي بإستخدام أكثر من طريقة لإستخراج كل قانون
patterns of utterance stress in discourse direct attention to specific themes and reactions, controlling the flow and coherence of conversation. this study examines the utterance stress in Steve Harvey's selected episodes from a phono-stylistic perspective. this study is hoped to improve understanding of linguistic mechanism in talk show communication, highlighting the importance of phonetic features in transmitting meaning and increasing broadcast conversation participation. the researcher concentrates on the types of focus functions of utterance stress of some episodes available on YouTube. to conduct the analysis, the researcher adopts (Carr, 2013; Davenport& Hannahs 2005) to analyze utterance stress and Leech and Short (2007
... Show MoreIn this paper, I highlight the bishops mentioned in the Bible in its sections
(The Old and New Testaments) where these books still retain the remaining remnant of the Bible
Issuing the prophets who preceded the mission of the Prophet Muhammad (peace and blessings of Allaah be upon him) and they must pray
And peace, as those bishops were mentioned in the Book of Formation through the recitation of the psalms
To Habakkuk, Malakhi, and Hajji.
As well as in the New Testament, which we see clearly in the four Angels: Matthew, Luke,
Disco, John.
Then the male lamented what was said of those bishops by expressing the eternal heavenly book (the Qur'an)
Al - Karim) as he focuses on this subject from multiple angles and exp
The influence of Cr3+ doping on the ground state properties of SrTiO 3 perovskite was evaluated using GGA-PBE approximation. Computational modeling results infered an agreement with the previously published literature. The modification of electronic structure and optical properties due to Cr3+ introducing into SrTiO 3 were investigated. Structural parameters assumed that Cr3+ doping alters the electronic structures of SrTiO 3 by shifting the conduction band through lower energies for the Sr and Ti sites. Besides, results showed that the band gap was reduced by approximately 50% when presenting one Cr3+ atom into the SrTiO 3 system and particularly positioned at Sr sites. Interestingly, substituting Ti site by Cr3+ led to eliminating the ban
... Show MoreThe analysis of rigid pavements is a complex mission for many reasons. First, the loading conditions include the repetition of parts of the applied loads (cyclic loads), which produce fatigue in the pavement materials. Additionally, the climatic conditions reveal an important role in the performance of the pavement since the expansion or contraction induced by temperature differences may significantly change the supporting conditions of the pavement. There is an extra difficulty because the pavement structure is made of completely different materials, such as concrete, steel, and soil, with problems related to their interfaces like contact or friction. Because of the problem's difficulty, the finite element simulation is
... Show MoreIn this study, the modified Rayleigh-Ritz method and Fourier series are used to determine the thermal buckling behavior of laminated composite thin plates with a general elastic boundary condition applied to in-plane uniform temperature distribution depending upon classical laminated plate theory(CLPT). A generalized procedure solution is developed for the Rayleigh-Ritz method combined with the synthetic spring technique. The transverse displacement of the orthotropic rectangular plates is not a different term as a new shape expansion of trigonometric series. In this solution approach, the plate transverse deflection and rotation due to bending are developed into principle Fourier series with a sufficient smoothness auxi
... Show MoreBackground: Alopecia areata(AA) is a common autoimmune disease that causes hair loss without scarring. It occurs as a result of T-helper 1 (Th1) and Th17 cells attacking the anagen hair follicles. Genetic factors play a role in the occurrence of infection, which stimulates the production of pro and anti-inflammatory interleukins. Polymorphisms of IL-37 play a role in autoimmune diseases. However, IL37 single nucleotide polymorphisms(SNP) have not been identified in patients with AA. Therefore, this study aimed to reveal the IL37 gene SNP and its relationship to AA. Methods: Genotyping of IL-37 gene single nucleotide polymorphisms SNPs were detected using sequence-specific primer-polymerase chain reaction (SSP-PCR) method was done following
... Show MoreThe paper presents mainly the dynamic response of an angle ply composite laminated plates subjected to thermo-mechanical loading. The response are analyzed by analytically using Newmark direct integration method with Navier solution, numerically by ANSYS. The experimental investigation is to fabricate the laminates and to find mechanical and thermal properties of glass-polyester such as longitudinal, transverse young modulus, shear modulus, longitudinal and transverse thermal expansion. Present of temperature could increase dynamic response of plate also depending on lamination angle, type of mechanical load and the value of temperature.
So far, APT (Advanced Persistent Threats) is a constant concern for information security. Despite that, many approaches have been used in order to detect APT attacks, such as change controlling, sandboxing and network traffic analysis. However, success of 100% couldn’t be achieved. Current studies have illustrated that APTs adopt many complex techniques to evade all detection types. This paper describes and analyzes APT problems by analyzing the most common techniques, tools and pathways used by attackers. In addition, it highlights the weaknesses and strengths of the existing security solutions that have been used since the threat was identified in 2006 until 2019. Furthermore, this research proposes a new framework that can be u
... Show More