In a quick reading of the character of Camille Ben Ziad al-Nekha al-Kufi al-Taabi, one of the most sincere companions of Imam Ali (peace be upon him), he enjoyed great status and status because he was one of the people of his people who lived alongside Imam Ali (peace be upon him) since his tribe migrated from Yemen to Kufa To this end, he became loyal during the reign of Imam Ali (peace be upon him), who is also a member of the delegation coming from Kufa to protest against the actions of the Wali of Kufa during the reign of Caliph Uthman ibn Affan. After the death of Caliph Uthman bin Affan, (Peace and blessings of Allaah be upon him) (Duaa kamil), one of the most famous and important supplications in Islamic history, and each one of us who hears du'aa 'is heartfelt. The scholars have described it with several descriptions: "He is the bearer of the secret of Imam Ali (peace be upon him) Kamil bin Ziyad's position in the Arab-Islamic heritage lies in the internal events of the Islamic state during the reign of the Caliph Uthman ibn Affan, and the fact that he participated with Imam Ali (peace be upon him) in the Battle of Gamal, Safin and Nahrawan, and knew that he was honest and obedient In his people, and then Imam Ali (peace be upon him) working on the house of Alma As well as his role in the protection of the city of Hit when he was the guardian of it and hence began to address the attempts of Muawiya, which was aimed at controlling the areas under the rule of Imam Ali (peace be upon him), he continued to loyalty and love to the house of the Prophet, (Peace be upon him) after the persecution of his father, the Hajjaj bin Yusuf Al-Thaqafi was killed during the reign of Marwan bin al-Hakam, Kamil bin Ziyad year (82 e) after the request in his request was forced to surrender himself to the pilgrims after his famous saying "I am a great Sheikh has fed "The pilgrims hit his neck and were buried in the back of Kufa in an area called Al-Thawba near Of Najaf
The current research is concerned with a pragmatic study of attack and defense acts that are used by President Donald Trump in the American Presidential Debate in 2020. Attack is an attempt to harm or defeat someone, and it is a bold message that the speaker or attacker does not like or disagree with the other antagonist. On the contrary, defense means a person responds to an attack of his or her opponent. After an attack, the politician either negates or fact-checks claims made by his opponents or tries to set the record straight. By the end of the study, it is expected to answer the following questions: What are the most frequent strategies of attack and defense that utilized by President Trump to formulate his speech? What are the reason
... Show MoreThe current study aimed to examine the histomorphological features of the oral salivary ducts and the peacock tongue (Pavo cristatus) of this species. In this study, eight healthy adult peacocks were used after collecting them from a commercial market in Baghdad to investigate and describe the tongue in these bird species. After being euthanized, they were killed by cutting off the major neck blood vessels and bleeding until death; the tongue was identified. The tongue was the sharp end, elongated, somewhat triangular, and measured 8.2 mm. The apex, trunk, and base are its three sections. There are 4 to 5 layers of big conical papillae on the area where the root and body converge. Without gustatory papillae, the dense keratinized ep
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show MoreThe present study was included the isolation of Keratinophilic fungi from water samples taken from 19 indoor public swimming pools in Baghdad during four season (summer ,fall ,spring ,and winter). Isolation period was September 2011and September 2012 . Samples were collected from different places in swimming pool . Sixteen keratinophilic fungal species, belonging to twenty –one genera were isolated using Surface Dilution Plating (SDP) and Hair Bait Technique (HBT) . Aspergillus genus was the most frequent and occurrence (19.84%), followed by Trichophyton (11.60%) and Fusarium (7.59% ) . The most common fungal infection occurred in summer season (42.16%) , and the most frequent month manifestation of species occurred in August
... Show MoreIn this work the parameters of plasma (electron temperature Te,
electron density ne, electron velocity and ion velocity) have been
studied by using the spectrometer that collect the spectrum of
plasma. Two cathodes were used (Si:Si) P-type and deposited on
glass. In this research argon gas has been used at various values of
pressures (0.5, 0.4, 0.3, and 0.2 torr) with constant deposition time
4 hrs. The results of electron temperature were (31596.19, 31099.77,
26020.14 and 25372.64) kelvin, and electron density (7.60*1016,
8.16*1016, 6.82*1016 and 7.11*1016) m-3. Optical properties of Si
were determined through the optical transmission method using
ultraviolet visible spectrophotometer with in the range
(
500 samples of diarrhea stool were collected from different ages(less than 1year –upto30years) and for both genders from some patients in (Alwiya hospital for children, Al-kendi, central health public laboratory and some gavernarated labs) period(1/11/2009—1/10/2010). Kinds of bacteria and parasites agents were isolated and identified from patients with diarrhea. Nine species of gram negative bacteria from enterobacteriaceae were isolated, E. coli isolated are the higher ratio 4.8% of all, then Salmonella typhi4.6% while the lowest ratios is Citrobacterfreundii 0.4%, while the other identified species were be among the previous rotios. also Plesomonasshigelloides was isolated which concedride one of the bacterial local studies.many met
... Show MoreMedia has become a common platform for communication as a tool of offense. English language has many insult words which are commonly used in the world of media. This study investigates the socio-pragmatic aspect of insulting in English news. It aims at identifying and analysing insult words and expressions used by news presenters. To specify the problem of the study, language has a harmful power that hurts the addressees and seriously harm their psychological well-being. The insulting words that are an element of all human languages are the source of this abusive power. The study questions sought to find out are if news presenters use insult words, which insult words, and in what social contexts. In this study, the descriptive method is use
... Show MoreThe excessive and prolonged use of any relevant material is known as substance abuse. The study’s objective is to determine the epidemiology of substance abuse’s growth in Iraq over the 4 years between 2020 and 2023.
A retrospective study was applied for the purpose of collecting the sample, as the study was epidemiological and related to substance abuse among Iraqis for 4 years from the beginning of 2020 to 2023. Participants’ data were collected from records that were available in the Iraqi Ministry of Health and Environment
