Abstract
This research studies Abu Baker Al-Siddiq’s commandments to the leaders of his armies. The research is organized into an Introduction, three sections, and a Conclusion.
The Introduction presents a definition of Style and Commandment terminologies. It also presents a brief biography of Abu Baker Al-Siddiq may Allah be pleased with him.
The first section explains the characteristics of the Composition and its rhetorical significance. In this Section, I study the types of predicate and the methods of construction in Abu Baker’s commandments and the rhetoric in using the connection and disconnection modifiers in his expressions.
The second section e
... Show MoreHeavy metals especially lead (Pb), cadmium (Cd), chromium (Cr) and copper (Cu) are noxious pollutants with immense health hazards on living organisms, these pollutants enter aquatic environment in Iraq mainly Tigris and Euphrates rivers via waste water came from different anthropological activities, This study investigated capacity of dried and ground root of water hyacinth (Eichhornia crassipes) in removing the heavy metals from their aqueous solutions. Effects of initial concentrations of the heavy metals and pH of their aqueous solutions were studied. Results of this study revealed excellent biosorption capacity of water hyacinth root in general, removal of Pb was the highest and Cr was lowest. The results showed that the Pb, Cu and C
... Show MoreThe present study focuses on the deformation of neutron-rich nuclei near the neutron drip line. The nuclei of interest include 28O, 42Si, 58Ca, 80Ni, 100Kr, 122Ru, 152Ba, 166Sm, and 176Er. The relativistic Hartree - Bogoliubov (RHB) approach with effective density-dependent point coupling is utilized to investigate the triaxial deformation, and Skyrme - Hartree - Fock + Bardeen - Cooper - Schrieffer is used to analyze the axial deformation. The study aimed to understand the interplay between nuclear forces, particle interactions, and shell structure to gain insights into the unique behavior of neutron-rich nuclei. Despite these nuclei containing magic numbers, their shapes are still affected by the nucleons' collective behavior and
... Show MoreLaurylamine hydrochloride CH3(CH2)11 NH3 – Cl has been chosen from cationic surfactants to produce secondary oil using lab. model shown in fig. (1). The relationship between interfacial tension and (temperature, salinity and solution concentration) have been studied as shown in fig. (2, 3, 4) respectively. The optimum values of these three variables are taken (those values that give the lowest interfacial tension). Saturation, permeability and porosity are measured in the lab. The primary oil recovery was displaced by water injection until no more oil can be obtained, then laurylamine chloride is injected as a secondary oil recovery. The total oil recovery is 96.6% or 88.8% of the residual oil has been recovered by this technique as shown
... Show MoreA modified chemical method was used to prepare titanium dioxide nanoparticles (TiO2 NPs), which were diagnosed by several techniques: X-ray diffraction, Fourier transform infrared, field emission scaning electron microscopy, energy disperse X-ray, and UV-visible spectroscopy, which proved the success of the preparation process at the nanoscale level. Where the titanium oxide particles have an average particle size equal to 6.8 nm, titanium dioxide particles were used in the process of adsorption of Congo red dye from its aqueous solutions using a batch system. The titanium oxide particles gave an adsorption efficiency of Congo red dye up to more than 79 %. The experimental data of the adsorption process were analyzed with kinetic models and
... Show MoreBackground and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show MoreBackground: One of the most prevalent procedures in oral surgery is the removal of impacted mandibular third molars, typically accompanied by trismus, edema, and pain. Several methods and biomaterials were implemented to mitigate or avoid these surgical problems. Objectives: To evaluate the efficiency of chlorhexidine gel (WISDOM®) in minimizing postoperative sequelae associated with the impacted mandibular third molar that will be surgically extracted and its role in promoting early soft tissue closure of the surgical site. Methods: The study design was a double-masked and randomized, controlled clinical study that included healthy patients needing the removal of a mandibular third molar through surgery. The participants were rand
... Show MoreIn the last few years, there have been a lot of changes in the economy, society, and the environment. This has led to much competition between companies, directly and indirectly affecting production and marketing processes. Most companies are trying to cut production and manufacturing costs by using modern cost techniques such as product life cycle costing and Continuous Improvement (Kaizen) technology, in the method of measuring production costs or service costs, and the need for internal control to keep an eye on how these technologies are being used and how well they work. And to find out the effect of internal control on the implementation of costing techniques in Iraqi companies, 64 questionnaires were given to people who work in the i
... Show More