Preferred Language
Articles
/
joe-296
Civilizations and Environmental Particulars of Place in Islamic Holy Thresholds in Iraq (Alkadhumain Holy Threshold as a case study)
...Show More Authors

Islamic shrines architecture is one of the Islamic Architectural building types. It is called (Thresholds); (Atabat) in Arabic. Thoroughbred throughout the Islamic world from the east to west. In addition, it carries the style features and peculiarities of uniqueness from the rest of the types of Islamic architecture. By virtue of the particularity of its function as tomb for important person in Islamic history. Islamic shrines architecture has grown and evolved in started from the small shrines, and then taken to widen with the evolution of time in line with the value of the event and the rituals associated with it. Some of them to became centers of large cities of the largest in many parts of the Islamic world.

The research problem represented is the insufficiency of information about what roles influences and factors of place (cultural and environmental) in the formation of patterns and relationships space holy Islamic shrines architecture in Iraq. In addition, what the role-played by the inherited urban civilization Iraqi both sides physical & moral support and integration with the concepts and spirit of the Islamic religion, and its rules in construction of architecture. Moreover, presumably Holy Islamic shrines architecture in Iraq are to be studied and its impact on the urban structure and planning in many cities of Iraq mission. In addition to the dimensions of the moral and doctrinal and their impact on society, they have evolved modes of planning over time according to the needs and requirements circumstantial, but the factor of place had a role the basis for the formation of masses and spaces. In addition to the formal role of the Islamic religion and the nature of religious practice in which they are, and the availability of spatial knowledge about the factors that produced the Iraqi architecture, provides a comprehensive picture about the origin of processors and architectural configurations and their source of origin from which it came. Which branded the Islamic holy shrines in Iraq equipped and versatile textural characteristics and detailed thoroughbreds.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Study the Efficiency of Poly Nicotine Amide as Anticorrosion Coating on Stainless Steel and Study Its Biological Activity
...Show More Authors

Using an electrochemical polymerization technique at room temperature, poly nicotine amide (PNA) was produced from the monomer nicotine amide (NA) in aqueous solution. The structure of polymer layer generated on the stainless steel surface (316 L) (working electrode) is investigated by Fourier Transmission Infrared Region (FT-IR). The anti-corrosion activity of polymer coating on the stainless steel (SS 316 L) is investigated by electrochemical polarization in 0.20M solution of HCl at 293-323K. The graphene -modified polymer film-coated SS had greater protection efficiency (PE percent) when compared to Nano ZnO -modified polymer film-coated SS. For the corrosion process of SS 316 L, kinetic and thermo-dynamic parameters of activatio

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Thu Sep 01 2022
Journal Name
مجلة الأستاذ للعلوم الإنسانية والاجتماعية
Impoliteness in Some American Presidential Debates: A Pragmatic Study
...Show More Authors

The current research is concerned with a pragmatic study of attack and defense acts that are used by President Donald Trump in the American Presidential Debate in 2020. Attack is an attempt to harm or defeat someone, and it is a bold message that the speaker or attacker does not like or disagree with the other antagonist. On the contrary, defense means a person responds to an attack of his or her opponent. After an attack, the politician either negates or fact-checks claims made by his opponents or tries to set the record straight. By the end of the study, it is expected to answer the following questions: What are the most frequent strategies of attack and defense that utilized by President Trump to formulate his speech? What are the reason

... Show More
Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Scoping Study on Lightweight Cryptography Reviews in IoT
...Show More Authors

The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
A study for Bacterial Infection in Acute Diarrhea Patients
...Show More Authors

500 samples of diarrhea stool were collected from different ages(less than 1year –upto30years) and for both genders from some patients in (Alwiya hospital for children, Al-kendi, central health public laboratory and some gavernarated labs) period(1/11/2009—1/10/2010). Kinds of bacteria and parasites agents were isolated and identified from patients with diarrhea. Nine species of gram negative bacteria from enterobacteriaceae were isolated, E. coli isolated are the higher ratio 4.8% of all, then Salmonella typhi4.6% while the lowest ratios is Citrobacterfreundii 0.4%, while the other identified species were be among the previous rotios. also Plesomonasshigelloides was isolated which concedride one of the bacterial local studies.many met

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 28 2018
Journal Name
Journal Of The College Of Education For Women
The literature of the teacher and learner is a study in the light of “Holly Quran
...Show More Authors

Praise be to Allah, Lord of the Worlds, teach the pen, taught the human what he didn't know, Ihmad - Almighty - and thank him, and repent to him and ask forgiveness, which is the most forgiving, and bear witness that there is no god but Allah alone has no partner, gives and prevents, And I bear witness that Muhammad is  a slave to Allah  and his Messenger, who called for guidance and good speech and spoke, peace be upon him and his family and companions, and those who followed them until the Day of Judgment.

View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of The College Of Education For Women
The Problem of Paradox and its Manifestations: A Study in the Titles of Najm Wali's Novels
...Show More Authors

The irony pushes us to inquire about what is in the text of contradiction, irony, suspense, and other acts of paradox, as well as a departure from what is logical, or familiar, that attracts the attention of the addressee, and this is what drives us to introspect the text and interrogate it in order to get to know the intended product of the text or its real or metaphorical intent. On the other hand, the irony is more in the literary text than in the scientific texts. Therefore, critics add the word literature to it in their definition.

 As it is represented by the paradox, we will seek to study the paradox of the title and the problematic that it may pose as the beginning of the text, and i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
The Babylonian Woman As Heroine In Dekker’s Drama: The Babylonian Woman As Heroine In Dekker’s Drama
...Show More Authors

Abstract
The present research paper provides an analysis of Thomas Dekker’s
exaltation of the figure of the Babylonian woman as a tragic heroine in his dramatic
art. The paper falls into two sections. The first section outlines the deliberate
mispresentation of the figure of the Babylonian woman in the Bible and the
misreading of that figure. The second section reveals Dekker’s rectification of the
distorted image of the Babylonian woman, whom he defends and glorifies as a
heroine and a victim of misinterpretation and conspiracy.

View Publication Preview PDF
Publication Date
Fri Nov 15 2024
Journal Name
Iraqi Journal Of Science
Spatial and Temporal Analysis of Severe Dust Storm in Iraq in May 2022
...Show More Authors

Dust storms are a common ecological occurrence in many world‘s countries, mainly in dry and semi-dry parts. Dust storms tremendously influence human health, the environment, the climate, and numerous social aspects. In this paper, spatial and temporal analysis, metrological triggers, and trajectory, dust exporting areas of a severe dust storm that occurred in Iraq on May 16, 2022, were investigated. The dust storm's backward trajectory was determined using HYSPLIT model, which is then compared with MODIS and Meteosat satellite images. The weather is then analyzed using the NCEP/NCAR Reanalysis model, and the approximate area of these sources was determined using Landsat 8 satellite image classification method. The results revealed

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Engineering
Application of Building Information Modeling (3D and 4D) in Construction Sector in Iraq
...Show More Authors

ABSTRACT

Building Information Modeling (BIM) is becoming a great known established collaboration process in Architecture, Engineering, and Construction (AEC) industry. In various cases in many countries, potential benefits and competitive advantages have been reported. However, despite the potentials and benefits of BIM technologies, it is not applied in the construction sector in Iraq just like many other countries of the world.

The purpose of this research is to understand the uses and benefits of BIM for construction projects in Iraq. This purpose has been done by establishing a fr

... Show More
View Publication Preview PDF