The subject of the provisions of prayer on the chairs of the important topics in the jurisprudence they fall under the door of the people of excuses, and this section of the important doors in Islamic jurisprudence because it permeates scourge, as prayer is one of the pillars of this religion, and the first thing to be held accountable on the Day of Resurrection prayer If the peace reconciled the rest of his work and spoil corrupted all his work, the street wise was interested in this matter and put him provisions overlooked by many people these days became insulted him and do not pardon him, and do not know the rules and provisions approved by Shara, and the omission of one of these provisions is possible To lead to the invalidity of hi
... Show MoreCadmium oxide (CdO) thin films were deposited using the sequencing ion layer adsorption and reaction (SILAR) method. In this study, the effect of the pH value of an aqueous solution of cadmium acetate at a concentration of 0.2 mol of the cadmium oxide film was determined. The solution source for the cadmium oxide film was cadmium ions and an aqueous ammonia solution. The CdO films were deposited on glass substrates at a temperature of 90 ℃. The cadmium oxide film thickness was determined by the weight difference method at pH values (7.2, 8.2). X-ray diffraction (XRD) and scanning electron microscopy (SEM) showed that the size of the crystals increased with the increase in the solution (pH). While the UV-visible spectra of the fil
... Show MoreThe emergence of COVID-19 has resulted in an unprecedented escalation in different aspects of human activities, including medical education. Students and educators across academic institutions have confronted various challenges in following the guidelines of protection against the disease on one hand and accomplishing learning curricula on the other hand. In this short view, we presented our experience in implementing e-learning to the undergraduate nursing students during the present COVID-19 pandemic emphasizing the learning content, barriers, and feedback of students and educators. We hope that this view will trigger the preparedness of nursing faculties in Iraq to deal with this new modality of learning and improve it should t
... Show MoreThe possibility of implementing smart mobility in the traditional city: Studying the possibility of establishing an intelligent transportation system in the city center of Kadhimiya
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin
The simulation have been made for 3D flow structure and heat transfer with and without
longitudinal riblet upstream of leading edge vane endwall junction of first stage nozzle guide vane .The research explores concept of weakening the secondary flows and reducing their harmful effects.Numerical investigation involved examination of the secondary flows ,velocity and heat transfer rates by solving the governing equations (continuity, Navier -stokes and energy equations ) using the known package FLUENT version (12.1).The governing equations were solved for three dimentional, turbulent flowe, incompressible with an appropriate turbulent model (k-ω,SST) .The numerical solution was carried out for 25 mode
... Show MoreIn this study, iron was coupled with copper to form a bimetallic compound through a biosynthetic method, which was then used as a catalyst in the Fenton-like processes for removing direct Blue 15 dye (DB15) from aqueous solution. Characterization techniques were applied on the resultant nanoparticles such as SEM, BET, EDAX, FT-IR, XRD, and zeta potential. Specifically, the rounded and shaped as spherical nanoparticles were found for green synthesized iron/copper nanoparticles (G-Fe/Cu NPs) with the size ranging from 32-59 nm, and the surface area was 4.452 m2/g. The effect of different experimental factors was studied in both batch and continuous experiments. These factors were H2O2 concentration, G-Fe/CuNPs amount, pH, initial DB15
... Show MoreTrue random number generators are essential components for communications to be conconfidentially secured. In this paper a new method is proposed to generate random sequences of numbers based on the difference of the arrival times of photons detected in a coincidence window between two single-photon counting modules