The Fountain of poetry Canot be suddenly flow or flood from emptiness. but it is streams and motives drive it to move . Forward tat Calmness and latent in depth of poet ,and try to Chang it in to high wives , go in to details inside the seas of poetry ,to sail threw it on the ships of poetry in creative styel to reach to the point from imaginary meaning , so every poet has direction to competein poetry poetsin Lament of Imam Hussain, There versification of poetry didn’t come from emptiness , but there was clashes motive them threw Calling the personality of Imam Hussain to learn lesson in avery beautiful and greative styel ,to be the expression poem from many sides in the personality of Imam Hussain from that events and facts that happen in that time , The poet discover and repyouduce the battle (Altaf) , Altaf battle whichis absent from ore eves but its never absent from our maind in present time .
To specify this studing to detect the most important motives and clashes in lamentation of Imam Hussain , scince 1945 – 2010 , and out of coancern on that clashes to impact statement guide in lament of Imam Hussain , they have formend one of the pillars for the lamentation , to high light and constrat on to have it from researcher in modern eayes , Required research plant to divideol this study ing on three chapter , the first chapter concern on the intcnt function, the cecond chapter concern in conspt function while the third chapter concern in au thority function starting from couutinuation function of laurguage that mention by Gakbson .
The aim of the present work, was measuring of uranium concentrations in 25 soil samples from five locations of Al-Kut city. The samples taken from different depths ranged from soil surface to 60cm step 15 cm, for this measurement of uranium concentrations .The most widely used technique SSNTDs was chosen to be the measurement technique. Results showed that the higher concentrations were in Hai Al- Kafaat which recorded 1.49 ± 0.054 ppm . The uranium content in soil samples were less than permissible limit of UNSCEAR(11.7ppm).
Reciprocal Teaching is an interactive method that is used to improve reading comprehension. Using this teaching strategy, teachers and students take turns leading discussions regarding sections of text using the four strategies: predicting, questioning, clarifying and summarizing. This study is an attempt to investigate the effect of using reciprocal teaching on improving female college students' achievement in reading comprehension. To fulfill the aim of the study, the researcher has adopted two null hypotheses: first, there is no significant difference between the achievement of students' who practice the reciprocal teaching technique and that of students who do not practice it. Second, there is no statistically significant difference
... Show Moreeclaration has become today has an important and active and influential role in the recipient public life، and are concentrated advertising on the creativity component manufacture to attract his attention toward what to be announced from a variety products ، and is dominated by television commercials tempo and imagination، and display them a variety of ways catches the attention and an impressive simulates the their senses of hearing and sight ، to influence in the receiver and the public paid for purchase. Through it crystallization the subject of our research on the importance of creativity in television advertising and effective for attracting the attention of the public towards the receiver advertised products، and in
... Show MoreThis work evaluates the economic feasibility of various production scenarios for the Zubair reservoir in the Kifl oil field using cash flow and net present value (NPV) calculations. The Kifl field is an exploratory field that has not yet been developed or assessed economically. The first well was drilled in 1960, and three other wells were later drilled to assess the oil accumulation, so in this research, Different production scenarios were evaluated economically. These scenarios were proposed based on the reservoir model of the Zubair formation in the field. The research methodology used QUE$TOR software to estimate capital expenditures (CapEx) and operating expenditures (OpEx) based on field-level data, production prof
... Show MorePseudomonas aeruginosa has variety of virulence factors that contribute to its pathogenicity. Therefore, rapid detection with high accuracy and specificity is very important in the control of this pathogenic bacterium. To evaluate the accuracy and specificity of Polymerase Chain Reaction (PCR) assay, ETA and gyrB genes were targeted to detect pathogenic strains of P. aeruginosa. Seventy swab samples were taken from patients with infected wounds and burns in two hospitals in Erbil and Koya cities in Iraq. The isolates were traditionally identified using phenotypic methods, and DNA was extracted from the positive samples, to apply PCR using the species specific primers targeting ETA, the gene encoding for exotoxin A, and gyrB gene. The res
... Show MoreThe study aimed to effect of speed and die holes diameter in the machine on feed pellets quality. In this study was measured pellet direct measurement (%), pellet lengths (%), pellet durability (%) and pellet water absorption (%). Three die speeds 280, 300, and 320 rpm, three diameters of die holes in the machine 3, 4, and 5 mm, have been used. The results showed that increasing the pellet die speeds from 280 to 300 then to 320 rpm led to a significant decrease in direct measurement, pellet durability, and pellet water absorption was increased, whereas it did not significantly affect the pellet lengths. Increasing the die holes diameter from 3 to 4 then to 5 mm led to a significant de
It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.