Most of the mosques in the Islamic world fall under specific and known forms and patterns to a large extent, and such patterns have grown and evolved from the few basic and uniform models, but they changed slowly due to the impact with a mixture of changing functional requirements and cultural landscapes because of the variables of time and place to form patterns known and famous in this day across parts of the Islamic world and its borders. There was no exception to these patterns, but small numbers of mosques that were probably the result of personal experiences or improvisational resolutions, or in response to specific or temporary stimuli. However, the emergence of a specific pattern which does not belong to any of these patterns, but opposes it in founded design and planning, and the spread of this new style - surprisingly - in a vast area, and its appearance clearly and strikingly , is really visible phenomenon worthy of attention, study and investigation. The emergence of the problem of this research is by observing a specific pattern of the mosques characterized by differences evident in the features of the general planning - a combination of the distribution of events in the schemes of the mosques - and the details of architectural form - external and internal – and its functional formation such as the nature related to functional components of those mosques with each other which distinguish this style of mosques of any known pattern of common patterns of mosques throughout the world, and the Islamic world in particular, and within a certain area which is province of Sulaymaniyah, and in particular its position and a specific time period which lasted for two or three decades. Hence the idea of this research to study the pattern of an updated planning and architecture of mosques bearing the features that distinguish them from normal patterns of mosques, as this work attempts to ascertain the causes and variables that called for the emergence of such a pattern, assuming a range of cultural influences and natural reasons for this phenomenon based on the study of models and samples selected randomly from those mosques in the period of time specified by the search for the consideration of the statistical implications on one hand and the study of the determinants of design in those models on the other hand and that to know the most influential elements in causing these changes that generated the problem of this research which led to the emergence of this un ique style that characterized the mosques of this region from other mosques in the Islamic world.
KE Sharquie, AA Noaimi, AG Al-Ghazzi, 2010 - Cited by 2
Background: The treatment of dental tissues proceeding to adhesive procedures is a crucial step in the bonding protocol and decides the clinical success ofrestorations. This study was conducted in vitro, with the aim of evaluating thenanoleakage on the interface between the adhesive system and the dentine treated by five surface modalities using scanning electron microscopy and energydispersiveX-ray spectrometry. Materials and methods: Twenty five extracted premolars teeth were selected in the study. Standardized class V cavities were prepared on the buccal and lingual surfaces then the teeth divided into five main groups of (5 teeth in each group n=10) according to the type of dentine surface treatment that was used: Group (A): dentine was
... Show MoreBreast cancer is the most common cause of death among women worldwide (1)
. Breast self-exam (BSE) is considered
an important public health procedure; primary prevention should be given the highest priority in the fight against
cancer.
Cancer is considered the second leading cause of death in developed countries there was some 6.2 million cancer
related deaths, accounƟng for 12% of all deaths globally (5).Patients perception toward this disease and preference
concerning the types and aims of their treatment are vary they may loss hopes and become devastated and crippled
or even dies earlier, if told about the diagnosis (13). The study aimed to assess knowledge of female students regarding
BSE, and to find out rel
This study focused on benthic algae (epipelic and attached algae on concrete lining stream) in Bani-Hassan stream in Holly Karbala, Iraq. The qualitative and quantitative studies of benthic algae were done by collecting 240 samples from five sites in the study area for the period from December 2012 to November 2013. Also, the environmental variables of the stream were examined in term of temporary and spatial. The results showed that the stream was alkaline, hard, oligohaline and a well aerated. The total nitrogen to the total phosphorus (TN: TP) ratio indicates nitrogen limitation. 129 species of benthic algae belonging to 57 genera were identified. Bacillariophyceae (diatoms) was the predominant taxon (95 species) followed by Chlorophyce
... Show MoreThe most important features that we have reached through this study, are shown the cross-section of root were in the secondary growth stage and the epidermis of leaf were studded by stomata complex, the type of it was anomocytic that’s mean no have subsidiary cells around the guard cells, the mesophyll bifacial also the midrib region of leaf like the pear and the vascular bundle located in the center crescent in shape. The cross-sections of petiole ovate shape with two ears in the lateral side and the vascular bundles crescent in shape. The cross-section of fruits circular component of three-layer the outer layer pericarp, mesocarp, and the endocarp, surrounding the ovary or the see
The Jeribe Formation, the Jambour oil field, is the major carbonate reservoir from the tertiary reservoirs of the Jambour field in northern Iraq, including faults. Engineers have difficulty organizing carbonate reserves since they are commonly tight and heterogeneous. This research presents a geological model of the Jeribe reservoir based on its facies and reservoir characterization data (Permeability, Porosity, Water Saturation, and Net to Gross). This research studied four wells. The geological model was constructed with the Petrel 2020.3 software. The structural maps were developed using a structural contour map of the top of the Jeribe Formation. A pillar grid model with horizons and layering was designed for each zone. Followin
... Show MoreThis paper reports an experimental study of welding of dissimilar materials between transparent Polymethylmethacrylate (PMMA) and stainless steel 304 sheets using a pulsed mode Nd:YAG laser. The process was carried out for two cases; laser transmission joining (LTJ) and conduction joining (CJ). The former is achieved when the joint is irradiated from the polymer side and the latter when the joint is irradiated from the opposite side (metal side). The light and process parameters represented by the peak power (Pp), pulse duration (τ), pulse repetition rate (PRR), scanning speed (ν) and pulse shape have a significant effect on the joint strength (Fb), joint bead width (b), joint quality and appearance. The optimum parameters were determined
... Show MoreThe root lesion nematode, Pratylenchus neglectus, is one of the most damaging nematodes to affect wheat worldwide. The nematode is widely distributed in Montana, primarily affecting winter wheat within the state. Managing the nematode primarily involves rotation to resistant and moderately resistant crops (peas, lentils, and barley). A nematode survey was conducted across the state nearly 10 years after an initial survey, to reassess the nematode threat and assess the impact of changing trends in crop rotations. To assess the broad applicability of rotation crops to control P. neglectus across Montana, greenhouse trials were conducted to challenge rotational crops using eight populations of P. neglectus collected from geographicall
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show More