In a quick reading of the character of Camille Ben Ziad al-Nekha al-Kufi al-Taabi, one of the most sincere companions of Imam Ali (peace be upon him), he enjoyed great status and status because he was one of the people of his people who lived alongside Imam Ali (peace be upon him) since his tribe migrated from Yemen to Kufa To this end, he became loyal during the reign of Imam Ali (peace be upon him), who is also a member of the delegation coming from Kufa to protest against the actions of the Wali of Kufa during the reign of Caliph Uthman ibn Affan. After the death of Caliph Uthman bin Affan, (Peace and blessings of Allaah be upon him) (Duaa kamil), one of the most famous and important supplications in Islamic history, and each one of us who hears du'aa 'is heartfelt. The scholars have described it with several descriptions: "He is the bearer of the secret of Imam Ali (peace be upon him) Kamil bin Ziyad's position in the Arab-Islamic heritage lies in the internal events of the Islamic state during the reign of the Caliph Uthman ibn Affan, and the fact that he participated with Imam Ali (peace be upon him) in the Battle of Gamal, Safin and Nahrawan, and knew that he was honest and obedient In his people, and then Imam Ali (peace be upon him) working on the house of Alma As well as his role in the protection of the city of Hit when he was the guardian of it and hence began to address the attempts of Muawiya, which was aimed at controlling the areas under the rule of Imam Ali (peace be upon him), he continued to loyalty and love to the house of the Prophet, (Peace be upon him) after the persecution of his father, the Hajjaj bin Yusuf Al-Thaqafi was killed during the reign of Marwan bin al-Hakam, Kamil bin Ziyad year (82 e) after the request in his request was forced to surrender himself to the pilgrims after his famous saying "I am a great Sheikh has fed "The pilgrims hit his neck and were buried in the back of Kufa in an area called Al-Thawba near Of Najaf
The musical templates are the fundamental reason for admiration and interest among a lot of cultural and societal medias because of the beauty of it's melodic value, where a lot of Iraqi singing and music specialists and composers try to consolidate daily life idea and translate it into music in a manner that preserve the template and rhythm horizontally and vertically, through the involvement of the scientific and philosophical concepts and theories of modern thought to reach the recipient,, as is the theory of form (Gestalt), one of the most important theories that stretched to their interpretations to the field in general art and in music science, especially, as an area that can be manifested as partial components template music, conn
... Show MoreThe aim of this research is to know danger of radioactive isotopes
that are found in samples of drugs traded in Iraqi markets. The
samples are Iraqi Amoxicillin, English Amoxicillin, UAE
Amoxicillin, Indian Amoxicillin, Iraqi Paracetamol, English
Paracetamol, UAE Paracetamol and Indian Paracetamol. By high
purity germanium the activity of the following isotopes 40K, 214Pb,
228Ac and 137Cs is measured and the specific activity was used to
calculate the annual effective dose. Then the calculated annual
effective dose values are compared with the allowable annual
effective dose values of each part of digestive channel. This research
concluded that the measured annual effective dose values are not
dangerous.<
The current research sheds light on an important aspect of the great and rapid development in the field of science and technology and modern manufacturing methods as a result of the scientific revolution resulting from the accelerated cognitive development, which prompted designers in general and interior design in particular to exploit and invest in digital technology and the development of digital control in the process of designing the industrial product for the purpose of creativity and innovation through these digital programs Digital models achieve the requirements and desires of the interior designer according to the creative skill using modern software with high efficiency And extreme accuracy that is consistent with the requirem
... Show MoreCreep testing is an important part of the characterization of composite materials. It is crucial to determine long-term deflection levels and time-to-failure for these advanced materials. The work is carried out to investigate creep behavior on isotropic composite columns. Isotropy property was obtained by making a new type of composite made from a paste of particles of carbon fibers mixed with epoxy resin and E-glass particles mixed with epoxy resin. This type of manufacturing process can be called the compression mold composite or the squeeze mold composite. Experimental work was carried out with changing the fiber concentration (30, 40 and 50% mass fraction), cross section shape, and type of composite. The creep results showed that th
... Show MoreThe study examines the root causes of delays that the project manager is unable to resolve or how the decision-maker can identify the best opportunities to get over these obstacles by considering the project constraints defined as the project triangle (cost, time, and quality) in post-disaster reconstruction projects to review the real challenges to overcome these obstacles. The methodology relied on the exploratory description and qualitative data examined. 43 valid questionnaires were distributed to qualified experienced engineers. A list of 49 factors causes was collected from previous international and local studies. A Relative Important Index (RII) is adapted to determine the level of importance of each sub-criterion in the fou
... Show MoreThe type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No
... Show More