The research aims for the study about Ibn Tulun's personal and scientific biography to the
scholar, scientist and historian Ibn Tulun Shams Id- Din Mohammad Ibn Ali al-Dimashqi al-
Salihi (953 A.H. / 1546 A.D.) Ibn Tulun was a prominent Muslim historian in Blad al-
Sham.
At the first deals with Ibn Tulun's personal biography, author's name, Lineage, and
nickname, his nativity; his upbringing, and edification, his moral character, Finally, his death.
As to Ibn Tulun's scientific biography, at the first deals with his initiation into education
and learning , sheds light on his tutors and his authorities , scientific stations and travels , his
scholarly status , and Ibn Tulun's alumni or his students .
One of the most important intellectual issues, which receive attention is the issue of modernity, it has occupied the scholars of all time. However, modern poetry used to have special care in Iraq and in the Arab countries .. it is not strange that the concept of modernity is linked to history .. or having history as the most important dimension of its dimensions .. because Arab poetry is historical and it is moving into an area of the past that is still active in terms of language and literary image .. When some poets found that changing and modernizing poetry became a necessity of evolution, and one of the fundamentals of modernization, the cultural impact did not respond to the desire of poets, and their impulse in modern poetry
... Show MoreClassical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show MoreThe ongoing COVID‐19 pandemic caused by SARS‐CoV‐2 is associated with high morbidity and mortality. This zoonotic virus has emerged in Wuhan of China in December 2019 from bats and pangolins probably and continuing the human‐to‐human transmission globally since last two years. As there is no efficient approved treatment, a number of vaccines were developed at an unprecedented speed to counter the pandemic. Moreover, vaccine hesitancy is observed that may be another possible reason for this never ending pandemic. In the meantime, several variants and mutations were identified and causing multiple waves globally. Now the safety and efficacy of these vaccines are debatable and recommended to d
Abstract The study aimed at demonstrating the reality of sectarian coexistence in Iraq, which was characterized by the tolerance and coercion caused by the successive government policies to govern Iraq and to this day. The study was based on the hypothesis that coexistence between Islamic sects in Iraq can be achieved as long as there are strong bonds linking its components, and these bonds can produce coexistence between the sects based on peace. The study concluded that the hypothesis is correct, in addition to drawing a set of observations aimed at identifying weaknesses for advancing them through the adoption of mechanisms that address these weaknesses to yield towards a genuine peaceful coexistence among Islamic sects in Iraq.
Many literary research papers have dealt with the work of Margaret Atwood's The Handmaid's Tale (1985) as a feminist work. However, nearly few studies combine social oppression with religious extremism. To bridge this gap, the present study aims at exploring the use of totalitarian theocracy of terror to oppress its citizens in the name of religion. In other words, it explicates the way religion is used to brutally suppress and exploit people in general and vulnerable women in particular. To meet this objective, the study adopted the qualitative descriptive method to describe how religion is used as a contradictory controlling means in Gilead discourse. It also adopted the Foucault theory in analyzing the data of the study, illu
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreThe petroleum industry, which is one of the pillars of the national economy, has the potential to generate vast wealth and employment possibilities. The transportation of petroleum products is complicated and changeable because of the hazards caused by the corrosion consequences. Hazardous chemical leaks caused by natural disasters may harm the environment, resulting in significant economic losses. It significantly threatens the aim for sustainable development. When a result, determining the likelihood of leakage and the potential for environmental harm, it becomes a top priority for decision-makers as they develop maintenance plans. This study aims to provide an in-depth understanding of the risks associated with oil and gas pipeli
... Show MoreIn this study, ultraviolet (UV), ozone techniques with hydrogen peroxide oxidant were used to treat the wastewater which is produced from South Baghdad Power Station using lab-scale system. From UV-H2O2 experiments, it was shown that the optimum exposure time was 80 min. At this time, the highest removal percentages of oil, COD, and TOC were 84.69 %, 56.33 % and 50 % respectively. Effect of pH on the contaminants removing was studied in the range of (2-12). The best oil, COD, and TOC removal percentages (69.38 %, 70 % and 52 %) using H2O2/UV were at pH=12. H2O2/ozone experiments exhibited better performance compared to
... Show More