Nowadays, due to our everyday stress and current stressful lifestyle, the loss of items appears a frequent issue and may be very inconvenient. In this regard, until the IoT becomes part of everyday life, we can use the software as an efficient tool to assist a person's searching, verifying, and finding lost belongings. This paper presents an Android-based application that we proposed and implemented to help users find lost items. Utilizing this software will enable the subscriber to record his request to the relevant authority. In addition, a special section offers to insert a contact telephone number or email to communicate between the person who found the item and the person who lost it. During testing, among other services, the platform showed its capabilities to register and log users, releasing a lot of information of lost items and automatically forwarding lost-and-found notifications. The paper can be useful for those who deal with the application of information technology.
This contribution aims to investigate volume-dependent thermal and mechanical properties of the two most studied phases of molybdenum nitride (c-MoN and h-MoN) by means of the quasi-harmonic approximation approach (QHA) via first-principles calculations up to their melting point and a pressure of 12 GPa. Lattice constants, band gaps, and bulk modulus at 0 K match corresponding experimental measurements well. Calculated Bader’s charges indicate that Mo–N bonds exhibit a more ionic nature in the cubic MoN phase. Based on estimated Gibbs free energies, the cubic phase presents thermodynamic stability higher than that detected for hexagonl, with no phase transition observed in the selected T–P conditions as detected experimentall
... Show MoreAll domains in this world built based on set of theories. Those theories have been responsible for interpretation of some phenomena and interlocking relationships around us. Commonly, theories are categorized by which aspect is believed. Also,can find a group of theories produced regardingto the leadership domain. This paper will be presented some of these theories like (Great Man Theory, Trait Theory, Behavioral Theories, Contingency Theories, Situational Theory, Transactional Theories, and Transformational Theories). where these theories considered the most popular and common in the field of leader and will be discussed by this work
In the name of Allah, the Beneficent, the Merciful.
Praise be to Allah, Lord of the Worlds and peace and blessings on the honest and trustworthy (Muhammad) and his family and his divine good companions.
The Islamic clothing is one of the requirements of the common and original innateness to humans; the innateness that is created by God to all people, Allah says, (So set thou thy face steadily and truly to the Faith: [establish] Allah's handiwork according to the pattern on which He has made mankind: no change [let there be] in the work [wrought] by Allah: that is the standard Religion: but most among mankind understand not) (1). Islam as a natural religion has ordered the Muslims to wear decently, Allah says, ( O Children of Adam!
Praise be to Allah, Lord of the Worlds, and peace and blessings be upon our master Muhammad and his good and pure family. At the end of this research, we summarize some of the most important findings of our research, namely:
Raising a child properly from childhood leads to integrity in the life of the individual society, and if the young raised bad education, this education will affect itself and society negatively, so on parents and government institutions in any country to take care of children, and Islamic countries Specifically to give the child great attention; he is raised on the Koran and watered from its fountains, and armed with a weapon of morality from a young age, and to understand the biography of Mustafa (peace be upon h
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show MoreOver the past ten years, tumor markers have played an increasingly important role in clinicaloncology. This trend is expected to continue as technology advances and our knowledge of thehuman body and disease processes grows. In the treatment of cancer, tumor markers are widelyused for a variety of purposes, including screening, selecting a management strategy,determining the prognosis, and post-therapy follow-up. A comprehensive of the fundamentalsof pathophysiology and identification strategies for each specific malignancy is necessary fortheir prudent application in clinical practice. Oncology's use of cancer biomarkers hastransformed the way that cancer is treated, and led to notable improvements in patient outcomesand cancer tre
... Show Morehemorrhagic fever (VHF), one of which is Filoviridae. The Filoviridae family includes the Ebola virus , is responsible for the current VHF outbreak in West Africa. Viral hemorrhagic fevers (VHFs) occur in various regions around the world, yet traditional diagnostic testing for these diseases has typically been conducted in major reference laboratories located in Europe and the United States. In this review, we explore the current understanding of the mechanisms driving the pathogenesis of viral hemorrhagic fevers (VHFs) and examine the progress in developing preventive and therapeutic strategies for these infections.
This research provides a study of the virtual museums features and characteristics and contributes to the recognition of the diversity of visual presentation methods, as the virtual museums give the act of participation and visual communication with programs at an open time, so that it would contribute to reflection, thinking and recording notes, developing the actual and innovative skills through seeing the environments. The study has been divided into two sections the first one is virtual museum techniques. The techniques were studied to reach the public and are used remotely by the services of personal computers or smart phones being virtual libraries that store images and information that was formed and built in a digital way and how
... Show Moreكان لنهاية الحرب الباردة وعولمة العالم على وفق رؤية كونية تتجاوز حدود ومفاهيم السيادة الوطنية والقومية الاثر الواضح في ترتيب العلاقات الدولية , واصبحت تلك العلاقات تدور حول محورين الاول .. هو الاعتماد المتبادل بين الدول من اجل الوصول الى خطوط مشتركة للمصالح المختلفة بين هذه الدول . والآخر.. هو تبعية الدول الضعيفة للدول القوية لافتقار الاولى توفير الحاجيات الى مواطنيها . هذا يشير الى نشأة علا
... Show More