Values and ideals are two basic pillars in human life, and high societies have been keen throughout their ages to adhere to and establish them so that man can distinguish good and evil, right and wrong, as they are a balance of actions that give man a higher value. Many of the followers of Abbasid literature, poetry and prose – it is noted that many imams and writers have been keen to highlight these values and make them material for their poetry and literature, courage, generosity, chastity and....All meanings of human values and there is no doubt that one of the texts abounding in this field is what was reported from the people of the house of infallibility pure (peace be upon them), including we touch it in the visit of Imam Jaafar al-Sadiq (peace be upon him) to his grandfather Imam Hussein (peace be upon him) known as the visit of the forty, it has included ideals and values that guide us to adhere to faith in God Almighty and rely on him and renounce injustice and follow the passion and not to rely on the world and make it the end has embodied these values in the personality of Imam Hussein (peace be upon him).This is what we will try to highlight through the following axes: - 1- The first axis: resorting to God Almighty and believing in His mandate and caring for His honored servants who believed in their slavery to Him, so they were guardians who had the highest values of slavery and the like. 2- The second axis: describing the world and making it a means to reach the lofty values and not to rely on their decoration. 3- The third axis: rooting for innocence from the enemies of God Almighty, His Messenger and His guardians who want.4- The fourth axis: values and ideals in declaring the mandate and witnessing it to Imam Hussein through the representation of the verses of the Holy Qur'an.were
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreThe CuInSe2 (CIS) nanocrystals are synthesized by arrested precipitation from molecular precursors are added to a hot solvent with organic cap- ping ligands to control nanocrystal formation and growth. CIS thin films deposited onto glass substrate by spray - coating, then selenized in Ar- atmosphere to form CIS thin films. PVs were made with power conversion efficiencies of 0.631% as -deposited and 0.846% after selenization, for Mo coated, under AM 1.5 illumination. X-ray diffraction (XRD) and energy dispersive spectroscopy (EDS) analysis it is evident that CIS have the chalcopyrite structure as the major phase with a preferred orientation along (112) direction and the atomic ratio of Cu : In : Se in the nanocrystals is nearly 1 : 1 : 2
Nanotechnology is a continually expanding field for its uses and applications in multiple areas i.e. medicine, science, and engineering. Biosynthesis is straightforward, less-toxicity, and cost-effective technology. TiO2 NPs biosynthesis has attained consideration in recent decades. In this study, probiotic bacteria were isolated from cow’s raw milk samples, and then were identified by using the Vitek2 system; as Leuconostoc spp. included Leuconostoc mesenteroides subsp. mesenteroides (Leu.1), Leuconostoc mesenteroides subsp. cremoris (Leu.4), and Leuconostoc pseudomesenteroides (Leu.14). All Leuconostoc spp. isolates showed an ability for TiO2 NPs bio-production, after being incubated at anaerobic conditions (30 o C/ 24 h) in DeM
... Show MoreIn this study, an experimental investigation had conducted for six high strength laced reinforced concrete one-way slabs to discover the behavior of laced structural members after being exposed to fire flame (high temperature). Self-compacted concrete (SCC) had used to achieve easy casting and high strength concrete. All the adopted specimens were identical in their compressive strength of ( , geometric layout 2000 750 150 mm and reinforcement specifics except those of lacing steel content, three ratios of laced steel reinforcement of (0.0021, 0.0040 and 0.0060) were adopted. Three specimens were fired with a steady state temperature of for two hours duration and then after the specimens were cooled suddenly by spraying water. The
... Show MoreThe extraction of Eucalyptus oil from Iraqi Eucalyptus Camadulensis leaves was studded using water distillation methods. The amount of Eucalyptus oil has been determined in a variety of extraction temperature and agitation speed. The effect of water to Eucalyptus leaves (solvent to solid) ratio and particle size of Eucalyptus leaves has been studied in order to evaluate the amount of Eucalyptus oil. The optimum experimental condition for the Eucalyptus oil extraction was established as follows: 100˚C extraction temperature, 200 rpm agitation speed; 0.5 cm leave particle size and 6:1 ml: g amount of water to eucalyptus leaves Ratio.
An electrocoagulation process has been used to eliminate the chemical oxygen demand (COD) from wastewaters discharged from the Al-Muthanna petroleum refinery plant. In this process, a circular aluminum bar was used as a sacrificial anode, and hallow cylinder made from stainless steel was used as a cathode in a tubular batch electrochemical Reactor. Impacts of the operating factors like current density (5-25mAcm-2), NaCl addition at concentrations (0-2g/l), and pH at values (3-11) on the COD removal efficiency were studied.
Results revealed that the increase in current density increases the COD removal efficiency, whereas an increase
The Weibull distribution is considered one of the Type-I Generalized Extreme Value (GEV) distribution, and it plays a crucial role in modeling extreme events in various fields, such as hydrology, finance, and environmental sciences. Bayesian methods play a strong, decisive role in estimating the parameters of the GEV distribution due to their ability to incorporate prior knowledge and handle small sample sizes effectively. In this research, we compare several shrinkage Bayesian estimation methods based on the squared error and the linear exponential loss functions. They were adopted and compared by the Monte Carlo simulation method. The performance of these methods is assessed based on their accuracy and computational efficiency in estimati
... Show More