The Egyptian and Iraqi schools are one of the most important musical schools in the style of playing the oud. The influence of the style of these schools extended in the contemporary Arab world, and there were important names that emerged characterized with their style of playing. Thus, the ways of tuning the strings of oud varied between the two schools because of the difference in the ways of playing and the difference in the style of expression. The aim of the research was to identify the pluralism of the variable tunings of the strings of the contemporary Arab oud of the Egyptian and Iraqi schools, along the historical period extending from the late nineteenth and twentieth centuries to the present time. The oud has been classified into (five, six and seven strings). The samples representing the two schools were chosen intentionally, according to the variable in the tuning, and according to the classifications of the type of oud. The traditional five-string tuning of the oud has been relied on, derived from the quartet equation of Al-Kindi, as a principle to know the variable in the tuning of the contemporary Arab Oud. Types of tuning in both schools and the extent of similarity and difference between them linked to the method of performance and expression of the two schools have been identified.
In this study, we made a comparison between LASSO & SCAD methods, which are two special methods for dealing with models in partial quantile regression. (Nadaraya & Watson Kernel) was used to estimate the non-parametric part ;in addition, the rule of thumb method was used to estimate the smoothing bandwidth (h). Penalty methods proved to be efficient in estimating the regression coefficients, but the SCAD method according to the mean squared error criterion (MSE) was the best after estimating the missing data using the mean imputation method
An accurate assessment of the pipes’ conditions is required for effective management of the trunk sewers. In this paper the semi-Markov model was developed and tested using the sewer dataset from the Zublin trunk sewer in Baghdad, Iraq, in order to evaluate the future performance of the sewer. For the development of this model the cumulative waiting time distribution of sewers was used in each condition that was derived directly from the sewer condition class and age data. Results showed that the semi-Markov model was inconsistent with the data by adopting ( 2 test) and also, showed that the error in prediction is due to lack of data on the sewer waiting times at each condition state which can be solved by using successive conditi
... Show MoreThe objective of this article is to delve into the intricate dynamics of marriage relationships, exploring the impact of emotions such as fear, love, financial considerations and likability. In our investigation, we adopt a perspective that acknowledges the nonlinear nature of interactions among individuals. Diverging from certain prior studies, we propose that the fear element within the context of marriage is not a singular, isolated factor but rather a manifestation resulting from the amalgamation of numerous social issues. This, in turn, contributes to the emergence of strained and unsuccessful relationships. Unlike conventional approaches, we extensively examine the conditions essential for the existence of all socially signifi
... Show More Is one of the processes of educational guidance to help the individual to design educational plans that fit with the abilities and inclinations and goals.
And research aims the current instruction program heuristic therapeutic knowledge to deal with emotional disorders. And may the researcher instruct a program according to the theories of interested and competent guidance to education and has studied the large number of studies available in this field, as has been the program on a number of specialists in education and Psychology and took their views. And then was adopted the final version of the indicative program, consistent with the sample, which was built
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreOver the past few decades, the global usage and applications of different kinds of complementary and alternative medicine are greatly exaggerated among the general population, this requires improving the knowledge of all health care provider including pharmacists toward proper and safe use of different complementary and alternative medicine modalities. The current study aims to assess the Iraqi pharmacists' knowledge, use, and recommendation toward complementary and alternative medicine A cross-sectional pilot survey was done on a convenient sample of Iraqi pharmacists. Data were collected using a pretested