This research is about the resources and the way of al-Waqidi in his
researching of al-sira of the Prophet. And what happened in the first of Islam.
This research is about the documents which al-Waqidi had it. Some of it,
which he had visited, was the places, especially the periods which the events had took
place in. He was asking those whom were contemporary to the happenings, from the
sons of al-Sahaba and al-Tabi’een.
Also this research is lightening on the new studies that gave this historian a
good respect during his work, in which he could gave the reality about his authorship.
The research is trying to draw real way of al-Waqidi and what were reported by him,
especially the documents, and what he had seen. This will met edited especially the
real account of his book “Fituh al-Shaam”, if we don’t do it.
The samples were collected monthly crustaceans Mjmafah foot of two stations in tributary Zab down and two others in the Tigris River for one year with effect from November 2001 until October 2002 recorded during the study period the current 41 units taxonomic and were higher density of Mjmafah foot Guy Tigris River before the mouth of the tributary
In this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show MoreGenetic algorithms (GA) are a helpful instrument for planning and controlling the activities of a project. It is based on the technique of survival of the fittest and natural selection. GA has been used in different sectors of construction and building however that is rarely documented. This research aimed to examine the utilisation of genetic algorithms in construction project management. For this purpose, the research focused on the benefits and challenges of genetic algorithms, and the extent to which genetic algorithms is utilised in construction project management. Results showed that GA provides an ability of generating near optimal solutions which can be adopted to reduce complexity in project management and resolve difficult problem
... Show MorePV connected systems are worldwide installed because it allows consumer to reduce energy consumption from the electricity grid. This paper presents the results obtained from monitoring a 1.1 kWp. The system was monitored for nine months and all the electricity generated was fed to the fifth floor for physics and renewable energy building 220 V, 50 Hz. Monthly, and daily performance parameters of the PV system are evaluated which include: average generated of system Ah per day, average system efficiency, solar irradiation around these months. The average generated kWh per day was 8 kWh/day, the average solar irradiation per day was 5.6 kWh/m2/day, the average inverter efficiency was 95%, the average modules efficien
... Show MoreIn this paper, a literature survey was introduced to study of enhancing the hazy images , because most of the images captured in outdoor images have low contrast, color distortion, and limited visual because the weather conditions such as haze and that leads to decrease the quality of images capture. This study is of great importance in many applications such as surveillance, detection, remote sensing, aerial image, recognition, radar, etc. The published researches on haze removal are divided into several divisions, some of which depend on enhancement the image, some of which depend on the physical model of deformation, and some of them depend on the number of images used and are divided into single-image and multiple images dehazing model
... Show MoreIn this study multi objective optimization is utilized to optimize a turning operation to reveal the appropriate level of process features. The goal of this work is to evaluate the optimal combination of cutting parameters like feed, spindle speed, inclination angle and workpiece material to have a best surface quality Taguchi technique L9 mixed orthogonal array, has been adopted to optimize the roughness of surface. Three rods of length around (200 mm) for the three metals are used for this work. Each rod is divided into three parts with 50 mm length. For brass the optimum parametric mix for minimum Ra is A1, B1 and C3, i.e., at tool inclination angle (5), feedrate of 0.01, spindle speed of 120
... Show More