The study examines the religious references of the art of miniatures in the Iranian school "Bahzad model" completed in Iran during the twelfth century AH, according to the controls and characteristics of the authoritative references. The researcher presented the problem of research, its importance, the need for it and its purpose, defined the terms in the research. The theoretical framework came with three investigations. The first topic of the concept of the reference in the field of knowledge, which concluded the most important features of the reference, is that each symbolic existence corresponds to a real existence and symbolic presence is an input to the realization of the reference. The reference then becomes a sign that acts as a holding entity for the semantics, and the receiver draws through the reference about the cognitive background associated with the text. The second topic, the Islamic art, its characteristics and its components, is a title for it, and what distinguishes Islamic art with characteristics unique to it is religious art. The third topic reviewed the most important Iranian schools in the art of photography. The results of the research came to analyze the selected models of the works of the miniatures artist (Behzad). The results of the research were achieved for its purpose, the most important of which is the arrangement of the photographic composition and the portrayal of human forms of different sizes according to social and religious status.
Melatonin is a potent scavenger of reactive oxygen species or free radicals like superoxide and hydroxyl radicals. The oxidation of hemoglobin to methemoglobin (meth-Hb) by oxidizing compounds has been widely studied. The present work was designed to evaluate the ability of different concentrations of melatonin to inhibit nitrite–induced oxidation of hemoglobin. Blood samples were obtained from apparently healthy individuals from which erythrocyte hemolysate was prepared. Different concentrations of melatonin (10-9-1.0 mg/ml) were incubated for 10 min with the hemolysate, then to the resultant mixture 1 ml of sodium nitrite (final concentration 0.6 mM) was added, and the
... Show MoreIslamic law has relied on a number of sources in order to denote the rulings issued by them, including what is original and what is sub, and it is known to all scholars, that the Prophet's Sunnah is the second major source after the Koran, which separated the overall and devoted its year and restricted absolute. God Almighty obeyed the owner and his followers, and that his obedience of obedience to God Almighty said: (Who obeys the messenger has obeyed God) (women: 80), and then between the peasant who believes in him and his victory and follow him, he said: (and he said: And the one who was revealed with them were the successful ones (al-A'raf: 157).
It is known that the Sunnah commanded to follow is the
Since the end of World War II, the United States of America began to look at the Gulf States and Iraq due to the possession of huge quantities of oil, after taking the American oil depletion in order to tighten control over the oil of these countries, has pursued various means, political and military, in the framework of its strategy So that it could achieve this control, which focused on control of production and prices, for the conviction that those who control oil impose control over the political decision of the countries of the world.
This study aimed to study the effect of Ziziphus spina christi Aqueous cold and Alcoholic leaves and fruits extracts on the growth and activities of the following types of bacteria :( Escherichia coli, Pseudomonas aeruginosa, Staphylococcus aureus and Streptococcus pyogenes ). The results appeared outweigh the alcoholic extract of leaves and fruits of Sidr that prepared by saxholate extractor by addition of ethanol 95% significant superiority as compared with aqueous extract that prepared by using distilled water as was its influence inhibitor to the growth and effectiveness of bacteria , about the treatment of in-vivo to cause injury to these types of bacteria diagnosed laboratory mice and treated with alcoholic extract of the leaves o
... Show MoreCutaneous leishmaniasis (CL) is a widespread, yet often overlooked, parasitic disease caused by the Leishmania protozoan, which is prevalent in numerous countries, including Iraq. This condition is marked by the appearance of skin lesions on various exposed areas of the body. In most old-world regions, sodium stibogluconate (SSG) is the classical widely used drug to treat CL. The progression of skin ulceration is controlled by different inflammatory modulators including cytokines and enzymes. In this study, the possible role of the enzyme Matrix metalloproteinase9 (MMP-9) and its inhibitor Metallopeptidase inhibitor-1 (TIMP-1) as immunological markers was evaluated in CL patients suffering from cutaneous leishmaniasis before and aft
... Show MoreBackground: Benign Prostate Hypertrophy(BPH)is a common urological problem worldwide which is defined as denomatous hyperplasia of the periurethralpart of prostate gland that occurs especially in men over 50 years old and that tend to obstruct urination by constriction the urethra Objectives: The study was aimed to investigate the level of Malondialdehyde (MDA), Nitric Oxide (NO) and Superoxide Dismutase (SOD) as an antioxidant, besides other factors such as the level of Lipids Profile (Total Chlosterol (TC), High Density Lipoprotein Cholesterol (HDL-C), Low Density Lipoprotein Cholesterol (LDL-C), Very Low Density Lipoprotein Cholesterol (VLDL-C), and Triglyceride (TG))in patients suffer from BPH . Methods: In this study ;clinical ,spec
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show More