Constructal theory plays a major role in the conceptual design stage of the structural system in architecture. It provides a conceptual framework for predicting the form depending on natural systems to model those systems geometrically according to the constructal law that works in two directions: the first is towards predicting the general form of the structural system, and the second is the physical application of the law in the process of detailed design of the parts of the system. The aim of this paper is to determine the mechanism adopted in the structural design according to the constructal theory, assuming that the structural design according to the constructal theory achieves
The Al-Shishtary is considered one of the well-known Andalus poets. His poetry represents a flood of kind emotions, springs from the sincere sources of Divine Love, and this is what we felt in his life and his literary prestige. He was a poet who was familiar withthe art of his timeknowsthe oldand popularintellectual assets ofIslamicSciencesof Sharee'a. This wide culture, which he had, is available to him through his many travels between the coasts of Syria, Egypt and others ... to become Imam of the religion way known as(Al-Shishtariyah)resonatedin the hearts ofthe general publicespecially the poor people. This showshis smoothand influential styleand his humanitarian andsimple words which resonate in the hearts of his followers, therefo
... Show MoreABSTRACT This study closely investigates the elements of Sigmund Freud’s theory “The Uncanny” in one of Larson’s most famous novels. Although the novel touches upon racial issues, the study explores the mysterious relationship between Irene and Clare based on the main features of Freud’s “The Uncanny,” which are represented by hidden sexual desire, envy, supernatural power, and double characters. The aspect of the sexual desire is indicated in the novel by sexual undertones expressed by Irene towards Clare’s physical features. Envy in the novel is expressed by Irene who shows resentful longing aroused by Clare’s possessions and qualities due to her passing to the white community. The aspect of omnipotence of thoughts is in
... Show MoreBackground Epilepsy is one of the most widespread neurological illnesses in the world with a prevalence rate of 2.8–19.5 per 1000 of the general population, and it is more prevalent in childhood. The understanding of the teachers about epilepsy has a significant impact on the academic performance and social skills of schoolchildren with epilepsy. Aim of Study This study aimed to assess teachers’ knowledge, attitude, and practice regarding epilepsy in schoolchildren and the association of certain studied variables with the level of schoolteachers’ knowledge, attitude, and practice. Subjects and Methods This was a cross-sectional study that included 402 participants and was conducted in Al-Rusafa/Baghdad during the period from November
... Show MoreIn this paper, game theory was used and applied to the transport sector in Iraq, as this sector includes two axes, the public transport axis and the second axis the private transport axis, as each of these axes includes several types of transport, namely (sea transport, air transport, land transport, transport by rail, port transport) and the travel and tourism sector, as public transport lacks this sector, as the competitive advantage matrix for the transport sector was formed and after applying the MinMax-MaxMin principle to the matrix in all its stages, it was found that there was an equilibrium point except for the last stage where the equilibrium point was not available Therefore, the use of the linear programming method was
... Show MoreNew trends in teaching and learning theory are considered a theoretical axis
from which came the background that depends on any source, or practice sample or
teaching plane, accuracy and simplicity prevent the development of the teaching
process. Many attempts have come to scene to illuminate the teaching background,
but they have not exceed those remarkable patterns and methods. Thus, the
appearance of the teaching theory have been hindered.
This led to the need for research and development in the field of teaching to
find out a specific teaching theory according to the modern trends and concepts.
Teaching is regarded a humanitarian process which aims at helping those who
want to acquire knowledge, since teach
Translating poetry is considered one of the most complicated types of translations. It
encounters many difficulties, the most important of which is the question of possibility or
impossibility of translating poetry. So, it is better to start by asking the following question: is
the translation of poetry possible? Or is it impossible? It is definitely a rhetorical question
because translation is as old as the presence of translated texts, which fills the shelves of
libraries. One can ask despite these difficulties, who would discourage people of the world
from translating poetry merely because it is fundamentally impossible? (Mann, 1970: 211)
The present paper will elaborate, in more detail, upon the necessary traits
In this paper, the process of comparison between the tree regression model and the negative binomial regression. As these models included two types of statistical methods represented by the first type "non parameter statistic" which is the tree regression that aims to divide the data set into subgroups, and the second type is the "parameter statistic" of negative binomial regression, which is usually used when dealing with medical data, especially when dealing with large sample sizes. Comparison of these methods according to the average mean squares error (MSE) and using the simulation of the experiment and taking different sample
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show More