The research aims at the scholars’attention to the importance and role of Arab Muslim women through books and historical studies that historians and scholars have taken up like Ibn Al-Jawzi (597 AH) and his book Safwat Al-Safwa, where he presented the conduct of worship and their words and deeds, and explained to women worshipers other aspects of their lives, such as the scientific aspect Crafts and works as well as their prominent role in preaching and religious guidance, and the impact of this on their morals and qualities. This study showed the strength of the personality of women and their high interest in worship. The importance of the study lies in knowledge.The research followed the role of Muslim women to carry the banner of Arab-Islamic civilization,culture, and preserved human thought.The Islamic community has stood up in pride and honor in front of the Muslim women who are straight and religious, as the leading scholars of preaching and guidance were asking her to preach and remind.Individuals cherished her career, as most of the women’s worshipers ’news came through their husbands, sons, or fathers, which indicates mutual respect, kindness, and love among members of the Muslim family.The researchers committed to documenting information from its sources and following the method of historical research method in investigating and supporting this with tables that count the number of female worshipers in each town.
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreModern agriculture is challenged by soil degradation, nutrient depletion, plant diseases, and excessive dependence on chemical fertilizers and pesticides. By examining different strains of Pantoea, the study highlights their role in promoting plant growth, improving their tolerance to stress, reducing reliance on synthetic agricultural inputs, and contributing to more sustainable and environmentally friendly agricultural practices. Using a combination of practical qualitative methods and reliable quantitative data, the research gathers extensive information on how these microbes impact various crops and key soil health indicators. The improvements in plant growth statistics and nutrient levels are often quite astonishing. The result
... Show More
It is easy to talk about democracy, but it is difficult to practice. We talk about postmodernism, but difficult to be embodied in the ground. Yet, the age of democracy and modernity at the same time prompted the researcher to try to find a media concept for it. It does not mean that this concept has not yet formed. But the rooting of democracy and the approaching of states and groups towards it, made it necessary to by studied again.
The relationship between democracy and the media has made them look like one concept. The existence of one is linked to the existence of the other. The reality is only a linguistic formulation, but the social and cultural aspect is related to democracy origin
... Show MoreObjectives: Recently, there have been important advances in the clinical application of targeted hybrid near-infrared (NIR) fluorescent-radioactive tracers. ICG-99mTc-nanocolloid, for example, is already being used by some centres for sentinel lymph node biopsy in head and neck cancer. The radioactive component allows imaging at depths which would not be possible with NIR alone and, once exposed, the NIR fluorescence reporter can be imaged at very high resolution. Gamma detection is currently carried out with a separate hand-held gamma camera or with a non-imaging probe. Visualisation of NIR fluorescence during surgery requires a dedicated NIR camera, several of which are available commercially. We describe a novel hand-held hybrid NIR-gamm
... Show MoreSolid waste generation and composition in Baghdad is typically affected by population growth, urbanization, improved economic conditions, changes in lifestyles and social and cultural habits.
A burning chamber was installed to burn cellulosic waste only. It was found that combustion reduced the original volume and weight of cellulosic waste by 97.4% and 85% respectively.
A batch composting study was performed to evaluate the feasibility of co-composting organic food waste with the cellulosic bottom ash in three different weight ratios (w/w) [95/5, 75/25, 50/50].
The composters were kept in controlled aerobic conditions for 7 days. Temperature, moisture, and pH were measured hourly as process succe
... Show MoreWith wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show MoreThe primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show More