This research attend about Alienation form for ornament’s clouds in Quran, which includes four parts, the first part talks about the research problem, the researcher identified by following question :( what’s the Alienation form for ornament’s clouds in Quran?). And then the research importance. The research goal talks about Alienation form for ornament’s clouds in Quran. And also research borders, likes means objectives borders, places borders, As well as Terms Definitions, in second part talks about Theoretical framework and previous studies, includes two parts, the first one study Alienation form, meaning and understandable, the second one talks about Alienation form in Islamic arts, As well as the researcher find only one study has relation with this study, after that’s his foxing for Theoretical framework Indicators , the third part of this study talks about (research procedures), and then rely to Descriptive analytical method to analysis The samples, (4) (50%) Of the total (8) samples according to goal of research. Then find some Results Including:
1- The Alienation form can found it in the movement of snack like (1, 4) (50%), this type of cloud is characterized by giving manifestation physically and aesthetically distinct.
2- The Alienation form lobular Heart pinned like form (1, 2, 3) (75%).this type used for Repetition property.
3- The ornament’s cloud makes inverse rotation Organize like (S) letter in English (3) (25%).
4-The ornament’s cloud makes Free regulation (1, 3) (50%). This Organize has Diversity design, because Get rid of the monotony, to give the ornament’s clouds Exciting and attract the attention.
The Conclusions Including:
1- Employ the decorative for floral decorations Design, to add new decorative Reflect Functional and aesthetic results.
2- The Alienation form gives many design options to make good forms Compatible with Core Area. After the Conclusions, the researcher talks about Recommendations and suggestions
My study here is about the (possible for itself) features especially in the (Alashaira) opinion, also I touch to the other logicians opinions, I clarified these features concisely in the preface to be clear in front of the reader, I made it in two studies and five subjects.I talked about the meaning of the existence in the ((possible for itself) theme, and I clarified its types in the logicians and the philosophers' opinions, through which the existence and the nonexistence are equal in it, as it cannot be existed nor be nonsexist unless with a separated reason, and there is no necessity to oblige its existence, or its nonexistence is impossible.Then I talked about the outweighing of the (possible for itself) as one side of the exi
... Show MoreIn this article we analysis the data of Iraqi children aged 0-9 months covered in Multiple Indicator Cluster Survey (MICS6-2018) to evaluate the nutritional status . Weight for-age z-score (WAZ), height-for-age z-score (HAZ) and BMI-for-age z-score were compared with the z-scores WHO standards. The overall prevalence of underweight and stunting of the children were 4 % and 11% respectively. Prevalence of overweight based on BMI-for-age for the sexes combined was 21%. Comparing the results obtained from MICS-6 with the results obtained from MICS-4, we find that there is an improvement in the nutritional status of Iraqi children concerning weight, but as for height, we find that there is an increase in the percentage of children who suffer fr
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreIn some cases, surgeons need to navigate through the computer system for reconfirmation patients’ details and unfortunately surgeons unable to manage both computer system and operation at the same time. In this paper we propose a solution for this problem especially designed for heart surgeon, by introducing voice activation system with 3D visualization of Angiographic images, 2D visualization of Echocardiography processed video and selected patient’s details. In this study, the processing, approximation of the 3D angiography and the visualization of the 2D echocardiography video with voice recognition control are the most challenging work. The work involve with predicting 3D coronary three from 2D angiography image and also image enhan
... Show MoreA Factorial Study for separation anxiety in students, of Baghdad City
In this research, the use of natural materials like wool and cannabis as intermediate reinforcement for prosthetic limbs due to their comfort, affordability, and local availability was discussed. As part of this study on below-the-knee (BK) prosthetic sockets, two sets of samples were made using a vacuum method. These sets were made of natural fiber-reinforced polymer composites with lamination 80:20: group (Y) had 4 perlon, 1 wool 4 perlon, and group (G) had 4 perlon, 1 cannabis 4 perlon. The two groups were compared with a socket made of polypropylene. Tensile testing was used to determine the mechanical characteristics of the socket materials. The Y group has a yield stress of 17 MPs, an ultimate strength of 18.75 MPa, and an elastic
... Show MoreThe Zubair reservoir in the Abu-Amood field is considered a shaly sand reservoir in the south of Iraq. The geological model is created for identifying the facies, distributing the petrophysical properties and estimating the volume of hydrocarbon in place. When the data processing by Interactive Petrophysics (IP) software is completed and estimated the permeability reservoir by using the hydraulic unit method then, three main steps are applied to build the geological model, begins with creating a structural, facies and property models. five zones the reservoirs were divided (three reservoir units and two cap rocks) depending on the variation of petrophysical properties (porosity and permeability) that results from IP software interpr
... Show MoreEichhornia, or water hyacinth represents a serious threat to potable water basins. This problem is materialized majorly in consuming large amounts of water and dissolved Oxygen that is necessary for aquatic life, and minorly in hindering water streams. Even there are limited trials to overcome such pests, none of them presents an acceptable solution economically and logically. Chlorine is a well-known biocide and broadly used in water industry. It could give a possible method to fight such weed. To investigate that, concentration-time plot should be introduced similar to any other microorganisms; especially, bacteria in water. In this work, various doses of Chlorine along various time
The deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming m
... Show More