The Eurasia Proceedings of Science Technology Engineering and Mathematics | Volume: 6
current research Cares about study patterns of optical and aesthetic values in the halls of occasions (weddings) because of their importance in providing an atmosphere of joy. The problem was through the study of light and its impact on the receiver and found a researcher that interior spaces allocated to the halls inappropriate in terms of functional and aesthetic so necessitated the need to study this phenomenon in order to be addressed through the study of light and its impact on the users of those spaces where research aims to current detection properties patterns optical in the internal spaces of the halls and identify some of the aesthetic values of the lighting for the interior spaces.The search consists of four chapters, the firs
... Show MoreAbstract:-
The title of the thesis (TAQWA "Piety", TAWAKKUL "Trusting” AND NIYYAH "Intention" ARE AMONG THE FACTORS OF ADJUSTMENT) is related to the first legislative source of Islam, the Qur’an, and highlights the positive effects while adhering to the teachings of Islamic Sharia in terms of its importance in building the individual and thus society.
In this study, the researcher follows the objective approach, which includes collecting verses that refer to the issue of piety, trust and intention, and studying the verses objectively according to the sources, language books, ethics, and so on.
I sought to give each topic important headings, then study the topic and clarify it in general, based on narrations an
... Show MoreThe present research was conducted to determine the effect of Cadmium Chlori de on the t stes and epididymis of white mice fed with diffl rent concentration (75, 1 00 150 ppm) of this hea y metal for three, ix and nine days. The r ults showed that cadm i um chloride caused s vera! histopathalogical change in testes and epidid mis in luding deg neration and cell necrosis in addition to the appearanc of haemorrh
... Show MoreThis paper is interested in comparing the performance of the traditional methods to estimate parameter of exponential distribution (Maximum Likelihood Estimator, Uniformly Minimum Variance Unbiased Estimator) and the Bayes Estimator in the case of data to meet the requirement of exponential distribution and in the case away from the distribution due to the presence of outliers (contaminated values). Through the employment of simulation (Monte Carlo method) and the adoption of the mean square error (MSE) as criterion of statistical comparison between the performance of the three estimators for different sample sizes ranged between small, medium and large (n=5,10,25,50,100) and different cases (wit
... Show MoreAbstract Planetary nebulae (PN) represents the short phase in the life of stars with masses (0.89-7) M☉. Several physical processes taking place during the red giant phase of low and intermediates-mass stars. These processes include :1) The regular (early ) wind and the envelope ejection, 2) The thermal pulses during Asymptotic Giant Branch (AGB ) phase. In this paper it is briefly discussed how such processes affect the mass range of Planetary Nebulae(PN) nuclei(core) and their evolution, and the PN life time, and fading time for the masses which adopted. The Synthetic model is adopted. The envelope mass of star (MeN ) and transition time (ttr) calculated respectively for the parameter (MeR =1.5,2, 3×10-3 M☉). Another time scale is o
... Show MoreThe current study included a detail morphological study of all parts of the species Ipomoea carnea Jacq. (Convolvulaceae) cultivated in different gardens, the roots, stems, leaves, flowers and fruit were studied in detail, also the pollen grains were studied and there are photographs for all the parts were putted.
This study showed that liver of Passer domesticus bilobed the right lobe is cardiac shape while the left is elliptical and the liver colour is brown. It is occupying most of anterior and middle parts of abdominal cavity. The liver is surrounded by Glison capsule which is represented by a thin layer of connective tissue with septum extend peripherally in liver tissue. The liver tissue is formed from polyhedral hepatocyte arrange as irregular hepatic cord surrounded the central vein. Each cell contains one or two nucleus with one or more nucleolus. The blood sinusoid appeared between the liver cells .The hepatic cord arranged radially around the central vein. The portal area is clear and surrounded by connective tissue. Gallbladder is almost
... Show MoreThe plants of genus Heliotropium L. (Boraginaceae) are well-known for containing the toxic metabolites called pyrrolizidine alkaloids (PAs) in addition to the other secondary metabolites. Its spread in the Mediterranean area northwards to central and southern Europe, Asia, South Russia, Caucasia, Afghanistan, Iran, Pakistan, and India, Saudi Arabia, Turkey, and over lower Iraq, Western desert. The present study includes the preparation of various extracts from aerial parts of the Iraqi plant. Fractionation, screening the active constituent, and identification by chromatographic techniques were carried out.Heliotropium europaeum
... Show MoreGymnastics play from sports games that need to use appropriate methods and strategies that address mental abilities and that let the learner create and think about better performance with the supervision and guidance of the teacher. The researcher has chosen meditative thinking, which is a kind of thinking that needs to be taken care of. It is thinking about the situation in front of the individual, analysing it to his elements and drawing up plans that need to be understood with a view to reaching the results required by the situation and evaluating the results in the light of the plans. The analysis of the situation looks to different elements and look for internal relationships between these elements in this case. The problem is that fem
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show More