This research attend about Alienation form for ornament’s clouds in Quran, which includes four parts, the first part talks about the research problem, the researcher identified by following question :( what’s the Alienation form for ornament’s clouds in Quran?). And then the research importance. The research goal talks about Alienation form for ornament’s clouds in Quran. And also research borders, likes means objectives borders, places borders, As well as Terms Definitions, in second part talks about Theoretical framework and previous studies, includes two parts, the first one study Alienation form, meaning and understandable, the second one talks about Alienation form in Islamic arts, As well as the researcher find only one study has relation with this study, after that’s his foxing for Theoretical framework Indicators , the third part of this study talks about (research procedures), and then rely to Descriptive analytical method to analysis The samples, (4) (50%) Of the total (8) samples according to goal of research. Then find some Results Including:
1- The Alienation form can found it in the movement of snack like (1, 4) (50%), this type of cloud is characterized by giving manifestation physically and aesthetically distinct.
2- The Alienation form lobular Heart pinned like form (1, 2, 3) (75%).this type used for Repetition property.
3- The ornament’s cloud makes inverse rotation Organize like (S) letter in English (3) (25%).
4-The ornament’s cloud makes Free regulation (1, 3) (50%). This Organize has Diversity design, because Get rid of the monotony, to give the ornament’s clouds Exciting and attract the attention.
The Conclusions Including:
1- Employ the decorative for floral decorations Design, to add new decorative Reflect Functional and aesthetic results.
2- The Alienation form gives many design options to make good forms Compatible with Core Area. After the Conclusions, the researcher talks about Recommendations and suggestions
Many problems are facing the installation of piles group in laboratory testing and the errors in results of load and settlement are measured experimentally may be happened due to select inadequate method of installation of piles group. There are three main methods of installation in-flight, pre-jacking and hammering methods. In order to find the correction factor between these methods the laboratory model tests were conducted on small-scale models. The parameters studied were the methods of installation (in-flight, pre-jacking and hammering method), the number of piles and in sandy soil in loose state. The results of experimental work show that the increase in the number of piles value led to increase in load carrying ca
... Show MoreInnovative laboratory research and fluid breakthroughs have improved carbonate matrix stimulation technology in the recent decade. Since oil and gas wells are stimulated often to increase output and maximum recovery, this has resulted in matrix acidizing is a less costly alternative to hydraulic fracturing; therefore, it is widely employed because of its low cost and the fact that it may restore damaged wells to their previous productivity and give extra production capacity. Limestone acidizing in the Mishrif reservoir has never been investigated; hence research revealed fresh insights into this process. Many reports have stated that the Ahdeb oil field's Mishrif reservoir has been unable to be stimulated due to high injection pressures, wh
... Show MoreInnovative laboratory research and fluid breakthroughs have improved carbonate matrix stimulation technology in the recent decade. Since oil and gas wells are stimulated often to increase output and maximum recovery, this has resulted in matrix acidizing is a less costly alternative to hydraulic fracturing; therefore, it is widely employed because of its low cost and the fact that it may restore damaged wells to their previous productivity and give extra production capacity. Limestone acidizing in the Mishrif reservoir has never been investigated; hence research revealed fresh insights into this process. Many reports have stated that the Ahdeb oil field's Mishrif reservoir has been unable to be stimulated due to high inj
... Show MoreVisible Light Communication (VLC) has emerged as a powerful technique for wireless communication systems. Providing high data rate and increasing capacity are the major problems in VLC. Recent evidence suggests that Multiple Input Multiple Output (MIMO) technique can offers improved data rates and increased link range. This paper describes the design and implementation of visible light communication system in indoor environment exploring the benefits of MIMO. The specific objective of this research was to implement a 4× 4 Multiple Input (LEDs) Multiple Output (photodetectors)-VLC communication system, where a 16 white power LEDs in four arrays are setting up at transmitter and four RX modules are setting up at receiver side without the nee
... Show MoreThe research aimed at designing teaching program using jigsaw in learning spiking in volleyball as well as identifying the effect of these exercises on learning spring in volleyball. The researchers used the experimental method on (25) students as experimental group and (27) students as controlling group and (15) students as pilot study group. The researchers conducted spiking tests then the data was collected and treated using proper statistical operations to conclude that the strategy have a positive effect in experimental group. Finally, the researchers recommended using the strategy in making similar studies on other subjects and skills.
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show Morethe study including isolation and identification of candida spp causing UTIs from patintes coming to al-yarmouk hospital