This research attend about Alienation form for ornament’s clouds in Quran, which includes four parts, the first part talks about the research problem, the researcher identified by following question :( what’s the Alienation form for ornament’s clouds in Quran?). And then the research importance. The research goal talks about Alienation form for ornament’s clouds in Quran. And also research borders, likes means objectives borders, places borders, As well as Terms Definitions, in second part talks about Theoretical framework and previous studies, includes two parts, the first one study Alienation form, meaning and understandable, the second one talks about Alienation form in Islamic arts, As well as the researcher find only one study has relation with this study, after that’s his foxing for Theoretical framework Indicators , the third part of this study talks about (research procedures), and then rely to Descriptive analytical method to analysis The samples, (4) (50%) Of the total (8) samples according to goal of research. Then find some Results Including:
1- The Alienation form can found it in the movement of snack like (1, 4) (50%), this type of cloud is characterized by giving manifestation physically and aesthetically distinct.
2- The Alienation form lobular Heart pinned like form (1, 2, 3) (75%).this type used for Repetition property.
3- The ornament’s cloud makes inverse rotation Organize like (S) letter in English (3) (25%).
4-The ornament’s cloud makes Free regulation (1, 3) (50%). This Organize has Diversity design, because Get rid of the monotony, to give the ornament’s clouds Exciting and attract the attention.
The Conclusions Including:
1- Employ the decorative for floral decorations Design, to add new decorative Reflect Functional and aesthetic results.
2- The Alienation form gives many design options to make good forms Compatible with Core Area. After the Conclusions, the researcher talks about Recommendations and suggestions
In this work, an analytical approximation solution is presented, as well as a comparison of the Variational Iteration Adomian Decomposition Method (VIADM) and the Modified Sumudu Transform Adomian Decomposition Method (M STADM), both of which are capable of solving nonlinear partial differential equations (NPDEs) such as nonhomogeneous Kertewege-de Vries (kdv) problems and the nonlinear Klein-Gordon. The results demonstrate the solution’s dependability and excellent accuracy.
The Ge0.4Te0.6 alloy has been prepared. Thin films of Ge0.4Te0.6 has been prepared via a thermal evaporation method with 4000A thickness, and rate of deposition (4.2) A/sec at pressure 2x10-6 Torr. The A.C electrical conductivity of a-Ge0.4Te0.6 thin films has been studied as a function of frequency for annealing temperature within the range (423-623) K, the deduced exponent s values, was found to decrease with increasing of annealing temperature through the frequency of the range (102-106) Hz. It was found that, the correlated barrier hopping (CBH) is the dominant conduction mechanism. Values of dielectric constant ε1 and dielectric loss ε2 were found to decrease with frequency and increase with temperature. The activation energies have
... Show MoreBotnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show MoreThe research aims to investigate the effects of GMAW or MIG welding process on the mechanical properties of dissimilar aluminum alloys 2024-T351 and AA 6061- T651. A series of experimental techniques have been conducted to evaluate mechanical properties of the alloys, by carrying out hardness, tensile and bending tests for welded and un-welded specimens.
Metal inert gas (MIG) has been carried out on sheet metal using ER- 4043(AlSi5) as a filler metal and argon as shielded gas. The welded joints were tested by X-ray radiography and Faulty pieces were excluded.
Welding joints without defects are subjected to heat treatment including heating the joints in furnace to 170 °C for half an hour then air cooling to rel
... Show MorePredicting vertical stress was indeed useful for controlling geomechanical issues since it allowed for the computation of pore pressure for the formation and the classification of fault regimes. This study provides an in-depth observation of vertical stress prediction utilizing numerous approaches using the Techlog 2015 software. Gardner's method results in incorrect vertical stress values with a problem that this method doesn't start from the surface and instead relies only on sound log data. Whereas the Amoco, Wendt non-acoustic, Traugott, average technique simply needed density log as input and used a straight line as the observed density, this was incorrect for vertical computing stress. The results of these methods
... Show MoreTopological indices provide important insights into the structural characteristics of molecular graphs. The present investigation proposes and explores a creative graph on a finite group G, which is known as the RIG. This graph is designated as ΓRS G2(4) indicating a simple undirected graph containing elements of G. Two distinct ertices are regarded as nearly the same if and only if their sum yields a non-trivial involution element in G. RIGs have been discovered in various finite groups. We examine several facets of the RIG by altering the graph through the conjugacy classes of G. Furthermore, we investigate the topological indices as applications in graph theory applying the distance matrix of the G2(4) group.
In wireless broadband communications using single-carrier interleave division multiple access (SC-IDMA) systems, efficient multiuser detection (MUD) classes that make use of joint hybrid decision feedback equalization (HDFE)/ frequency decision-feedback equalization (FDFE) and interference cancellation (IC) techniques, are proposed in conjunction with channel coding to deal with several users accessing the multipath fading channels. In FDFE-IDMA, the feedforward (FF) and feedback (FB) filtering operations of FDFE, which use to remove intersymbol interference (ISI), are implemented by Fast Fourier Transforms (FFTs), while in HDFE-IDMA the only FF filter is implemented by FFTs. Further, the parameters involved in the FDFE/
... Show More