This is a search for Al-Rwandiyah and its heretical deviant sects, and its destructive goals that targeted the Arab nation, and its true Islamic religion in order to exhale poisons of demolition and sabotage, leading to its racist, populist goals ( ) that the Magi aspire to to restore the so-called ancient Persian glories, and undermine the Abbasid caliphate.
Al-Biruni said: (And that a person will emerge who will restore the Magian state and seize all the land, and remove the king of the Arabs) (), and among the indications of Ibn Al-Nadim is that a populist man called Muhammad bin Al-Hussein who was turned into Zaidan () was (claiming... the transition of the Islamic state to a state Persia ..... and their religion, which is the religion of the Magians) (), and Ibn Al-Qaddah () had appeared to Zaidan and helped him with money, and helped him with men, so when Zaidan died, the matter became consistent with Ibn Al-Qaddah ().
Al-Baghdadi commented on this and said: (I do not find a Magi on the surface of the earth except that he is a loyalist waiting for their appearance at home, thinking that the king will return to them) Therefore, the destructive movements of their different walks and divergent ideas invested in the doctrine of solutions, reincarnation and interpretation to distort the image of Islam and obliterate the features of the Arab heritage. However, the vigilance and acumen of the Abbasid caliphate in the first Abbasid era dispelled its dreams and undermined its ideas by resolutely confronting it.
NA Nasir, H Amir, Faculty of medicine - Iraq, 2017 - Cited by 13
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThis research represents a practical attempt applied to calibrate and verify a hydraulic model for the Blue Nile River. The calibration procedures are performed using the observed data for a previous period and comparing them with the calibration results while verification requirements are achieved with the application of the observed data for another future period and comparing them with the verification results. The study objective covered a relationship of the river terrain with the distance between the assumed points of the dam failures along the river length. The computed model values and the observed data should conform to the theoretical analysis and the overall verification performance of the model by comparing it with anothe
... Show MoreThe second most commonly diagnosed cancer is colorectal cancer (CRC) is in female. The levels of progranulin, obestatin and liver enzymes including ALT, AST and ALP were measured in forty five sera in female patients suffering from CRC before chemotherapy initiation treatment as G1, G2 after first chemotherapy cycle and G3 after second chemotherapy cycle compared with thirty female as a healthy control G4. Results showed a high significant increased in progranulin concentration and a high significant decrease in obestatin in G2 than other groups. The correlation between progranulin and ALP was a significant negative (-ve) relation while obestatin with AST gave a significant positive (+ve) correlation in G. The results also showed non signif
... Show MoreA tetradentate (N2O2) Schiff base (H2Ldfm) was successfully synthesized via condensation of curcumin / diferuloylmethane (dfm) and L-leucine amino acid (HL). There were three different methods that used for synthesizing H2Ldfm; (refluxing, grading, and fusion). Ten different metal complexes were also successfully synthesized by combination of the Schiff base (H2Ldfm) and 1,10-phenanthroline (phen) ligand to form a hexadentate (N4O2) mixed ligands (Ldfm , phen) with ten different metal salts (M) where{ M= Al(III), Mn(II), Fe(III), Co(II), Ni(II), Cu(II), Ag(I), Cd(II), Hg(II), and Pb(II)}. The molar ratio of reactants was (1:1:1) (M: H2Ldfm : phen). The new Schiff base and its new complexes were characterized by different physicochemical tec
... Show MoreAtomic Force Microscope is an efficient tool to study the topography of precipitate. A study using Continuous Flow Injection via the use of Ayah 6SX1-T-2D Solar cell CFI Analyser . It was found that Cyproheptadine –HCl form precipitates of different quality using a precipitating agent's potassium hexacyanoferrate (III) and sodium nitroprusside. The formed precipitates are collected as they are formed in the usual sequence of forming the precipitate via the continuous flow .The precipitates are collected and dried under normal atmospheric pressure. The precipitates are subjected to atomic force microscope scanning to study the variation and differences of these precipitates relating them to the kind of response to both precipitates give
... Show MoreTheauthor addressed politeness discourse in “Surat Ghafir”. Quran texts include many rhetorical utterances which are considered pragmatic mechanismsconcerned with finding polite discourse. examining these texts allow to determine the effectiveness degree in the discourse, and to find the effect level that leads to interaction between the speaker and the listener. Graduation is considered an effect and a mechanism of discourse escalation.
The author reached a common definition of the graduation effectiveness term, due to its importance in finding polite discourse that is constructed by lingual manifestations some of which are escalation and graduation. Escalation is a mechanism to show the level of discourse graduation, it is a mea