It is a moral presumption that includes the object for its sake, and it is called the object for it or the object for its sake, which is the present tense after (lam, ki, fa, willn, and then), and it is not an excuse for the occurrence of the matter (1), and it requires a connection between the two sides of (a cause with a cause) united by a reason for a specific purpose (2). The object has a reason or an excuse, because it is an explanation of what came before it, of the cause. The reason for the occurrence of the action, being the motive for causing the action and the bearer of it (3), indicates that the infinitive is restricted to a special reason. So if I said: (I came to you with the hope of honoring you), then I attributed the coming to your souls, restricting it to a special cause, which is (the purpose), which is considered a direction and evidence for understanding the coming, because this is not an absolute general, but rather a cause (4).
Substantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovat
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreIt is widely accepted that early diagnosis of Alzheimer's disease (AD) makes it possible for patients to gain access to appropriate health care services and would facilitate the development of new therapies. AD starts many years before its clinical manifestations and a biomarker that provides a measure of changes in the brain in this period would be useful for early diagnosis of AD. Given the rapid increase in the number of older people suffering from AD, there is a need for an accurate, low-cost and easy to use biomarkers that could be used to detect AD in its early stages. Potentially, the electroencephalogram (EEG) can play a vital role in this but at present, no reliable EEG biomarker exists for early diagnosis of AD. The gradual s
... Show MoreMaterials recycling has a significant economic and environmental impact; as a result, steel, aluminium, plastic, and other recyclable materials have been pushed for use in construction materials. One of these recyclable materials is the crumb rubber, has been considered as a pavement component. The general behaviour of the composite rubber-hot mix asphalt system would be varied from that of the conventional rubber free mix. In this review, desirable characteristics of hot mix asphalt are highlighted first. Also, effect of gradation and the main types of rubber are specified. Afterward, many studies that considered the crumb rubber as a waste product and its associated mixture and modifiers are reviewed. The factors affect the crumb
... Show MorePerhaps it is of paramount importance for researchers to present grammatical topics with a uniqueness that distinguishes them from everything else that may overlap with them, and a specificity that distances them from much of what may be thought to be similar to them or similar to them. The subject pronoun is one of these topics that should be considered. Due to the uniqueness of this pronoun among the rest of the family of pronouns, with features and adverbs that deserve research and study, and then analysis and treatment; Because of its scientific value, it goes hand in hand with other pronouns. This topic would not have drawn my attention or received much of it had it not raised some fundamental questions, including, f
... Show MoreThe Historical effect of Conflict between North and South
To determine the relationship between celiac disease and reproductive disorder, twenty two women with recurrent spontaneous abortion (18-35) years have been investigated from the period 2017/11/1 – 2018/2/1 and compared wih twenty two parentally healthy women. All studied groups were carried out to measure antitissue transglutaminase IgA and IgG antibodies by Enzyme linked immunosorbent assay (ELISA) technique, There were a highly significant differences (P < 0.01) in the concentration of anti TtG IgA and IgG Ab compared to control group, while there was non-significant differences (P > 0.05) in the concentration of anti TtG IgA according to the age group and there was a significant difference (P < 0.05) in the concentration of anti TtG I
... Show MoreThis study aims to conduct an exhaustive comparison between the performance of human translators and artificial intelligence-powered machine translation systems, specifically examining the top three systems: Spider-AI, Metacate, and DeepL. A variety of texts from distinct categories were evaluated to gain a profound understanding of the qualitative differences, as well as the strengths and weaknesses, between human and machine translations. The results demonstrated that human translation significantly outperforms machine translation, with larger gaps in literary texts and texts characterized by high linguistic complexity. However, the performance of machine translation systems, particularly DeepL, has improved and in some contexts
... Show MoreBrowse Iraqi academic journals and research papers