Judaism followed the approach of monotheism after God Almighty sent Moses (peace be upon him) to convey to them the messages of their Lord, so that they might be on a right guidance and path, but the people did not follow that path.” Love of matter and faith in what is witnessed, so they portrayed the Lord in several images in line with what their souls drew upon them.
Polymer electrolytes systems compose of (PEO+KI+I2) and (PEO+RbI+I2) with different concentration, and a fixed amount of ethylene carbonate (EC) and propylene carbonate (PC) over temperatures range 293-343 K prepared by solution cast me
... Show MoreAdolescent pregnancy is common health problem still found in both developed and developing countries; as adolescent may have early sexual practice or early marriage. Adolescent mothers face substantially higher maternal and perinatal morbidity and mortality than adult women. This is a randomized prospective clinical study conducted at Al-Elwiya Maternity Teaching Hospital, Baghdad, Iraq. The objective of this work is to assess the adverse maternal, fetal and neonatal outcomes in early and late teenage pregnant mothers. Study sample consisted of 220 primigravid women with a singleton, cephalic, viable fetus and no congenital abnormality that gave birth at Al-Elwiya Maternity Teaching Hospital, Baghdad, Iraq. The 1stgroup: early teenage (46 w
... Show MoreIn this paper, we define a cubic bipolar subalgebra, $BCK$-ideal and $Q$-ideal of a $Q$-algebra, and obtain some of their properties and give some examples. Also we define a cubic bipolar fuzzy point, cubic bipolar fuzzy topology, cubic bipolar fuzzy base and for each concept obtained some of its properties.
Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreGypseous soils are considered one of the most problematic soils. The skirted foundation is an alternative technology that works to improve the bearing capacity and reduce settlement. This paper investigates the use of square skirted foundations resting on gypseous soil subjected to concentric and eccentric vertical load with eccentricity values of 4, 8, and 17 mm in 16 experimental model tests. To obtain the results by using this type of foundation, a small-scale physical model was designed to obtain the load–settlement behavior of the square skirted foundation; the dimension of the square footing is 100 mm × 100 mm with 1 mm thickness, the skirt depth (
The first chapter the importance of research and need for education scientists see that the roots of the use of a specimen Wheatley in learning and teaching back to Grayson Wheatley, one of the largest supporters of a modern construction, which lay the groundwork for the specimen stage and the form in which it is. That was attributed to him, often called his name called while some educators based learning strategy on the issue. He sees the learner in this model make him a meaningful understanding of problems during his progress, thereby acting with his colleagues to find solutions to them in small groups. He
Borders Search: Search by students is determined by th
... Show More