Preparation and Identification of some new Pyrazolopyrin derivatives and their Polymerizations study
This research is about his life in his life. The Status of the Import of the Arts of Information. And the danger lies in the effects that translate in the lives of people from the occurrence of the second life or not to occur, the experimentalists claim in this matter is not tangible and not tried in a sense not proven by science through experience and analysis All that is proven by science from this road is committed to it, and unless proven from this path no one has the right to speak it, and in their view, this is not the way to prove knowledge and facts. The search is based on the consideration of the origin of knowledge. Is it possible to prove without experience something or not? The question is whether religion has a basis
... Show MoreOver the years, the field of Medical Imagology has gained considerable importance. The number of neuroimaging studies conducted using functional magnetic resonance imaging (fMRI) has been exploding in recent years. fMRI survey gives to rise to large amounts of noisy data with a complex spatiotemporal correlation structure. Statistics play great role in clarifying the features of the data and gain results that can be used and explain by neuroscientists. Several types of artifacts can happen through a functional magnetic resonance imaging (fMRI) scanner Because of software or hardware problems, physical limitation or human physiologic phenomenon. Several of them can negatively affect di
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show MoreBackground: Irrigation of the canal system permits removal of residual tissue in the canal anatomy that cannot be reached by instrumentation of the main canals so the aim of this study was to compare and evaluate the efficiency of conventional irrigation system, endoactivator sonic irrigation system,P5 Newtron Satelec passive ultrasonic irrigation and Endovac irrigation system in removing of dentin debris at three levels of root canals and to compare the percentage of dentin debris among the three levels for each irrigation system. Materials and methods: Forty extracted premolars with approximately straight single root canals were randomly distributed into 4 tested groups of 10 teeth each. All canals were prepared with Protaper Universal ha
... Show MoreIt has become familiar to see alchemy as a methodological approach that combines conscious, diverse, psychological, social, structural, and discrete approaches in the communications technology that Marshall McLuhan found to be able to extend our bodies and senses, The media discourse has a deep and superficial structure produced by the first, with its social, cultural and historical backgrounds, in a context that connects the image with the word, as the "meanings are made" - everywhere, as described by Jonathan ) In fashion, in the arts as a whole, and from its "signs" Our analysis of «meaning», in the media, and communication through advertising, magazines, newspapers, television, and the Internet. Therefore, alchemy is preoccupied wi
... Show MoreAbstract:
Research Topic: Ruling on the sale of big data
Its objectives: a statement of what it is, importance, source and governance.
The methodology of the curriculum is inductive, comparative and critical
One of the most important results: it is not permissible to attack it and it is a valuable money, and it is permissible to sell big data as long as it does not contain data to users who are not satisfied with selling it
Recommendation: Follow-up of studies dealing with the provisions of the issue
Subject Terms
Judgment, Sale, Data, Mega, Sayings, Jurists
Abstract:
Al-Hamraa palace considers one of the most important urban traces
that the Arab left behind in Andalus .Muhammed bin Al—Ahmer put its fist
stones then it was finished later by his thrown hirer .The poems of (ibn-
Zumrek)were graved on the palaces doors ,halls, and lion cages with all the
proud and dignity those poems contain.
This search identifies this palace first, then studies the contents of the
poems on Walls ,then the Urban features, and description of the palace sites
,buildings materials ,pillars ,decorations, and the geometrical
Vocabularies in the poems such as spaces , direction ,distance ,and
height.
Then the search describes the technical engineering of words
coordination, the
Future wireless systems aim to provide higher transmission data rates, improved spectral efficiency and greater capacity. In this paper a spectral efficient two dimensional (2-D) parallel code division multiple access (CDMA) system is proposed for generating and transmitting (2-D CDMA) symbols through 2-D Inter-Symbol Interference (ISI) channel to increase the transmission speed. The 3D-Hadamard matrix is used to generate the 2-D spreading codes required to spread the two-dimensional data for each user row wise and column wise. The quadrature amplitude modulation (QAM) is used as a data mapping technique due to the increased spectral efficiency offered. The new structure simulated using MATLAB and a comparison of performance for ser
... Show MoreBackground and Aim: Canine parvovirus 2 (CPV-2) is a highly contagious virus that infects wild and domestic canines. Despite the use of a routine vaccination protocol, it is endemic in Iraq. The genetic drift of CPV-2 is a major issue worldwide because it abrogates virus control. In Iraq, there is a knowledge gap regarding the genetic sequences of asymptomatic and symptomatic CPV-2 cases. Therefore, this study aimed to perform a genetic analysis of viral capsid protein 1 (VP1) and viral capsid protein 2 (VP2), two major capsid-encoding genes, to demonstrate the possible role of certain mutations in triggering infection. Materials and Methods: Symptomatic and asymptomatic cases (n = 100/each) were tested by a polymerase chain reacti
... Show More