This is a search for Al-Rwandiyah and its heretical deviant sects, and its destructive goals that targeted the Arab nation, and its true Islamic religion in order to exhale poisons of demolition and sabotage, leading to its racist, populist goals ( ) that the Magi aspire to to restore the so-called ancient Persian glories, and undermine the Abbasid caliphate.
Al-Biruni said: (And that a person will emerge who will restore the Magian state and seize all the land, and remove the king of the Arabs) (), and among the indications of Ibn Al-Nadim is that a populist man called Muhammad bin Al-Hussein who was turned into Zaidan () was (claiming... the transition of the Islamic state to a state Persia ..... and their religion, which is the religion of the Magians) (), and Ibn Al-Qaddah () had appeared to Zaidan and helped him with money, and helped him with men, so when Zaidan died, the matter became consistent with Ibn Al-Qaddah ().
Al-Baghdadi commented on this and said: (I do not find a Magi on the surface of the earth except that he is a loyalist waiting for their appearance at home, thinking that the king will return to them) Therefore, the destructive movements of their different walks and divergent ideas invested in the doctrine of solutions, reincarnation and interpretation to distort the image of Islam and obliterate the features of the Arab heritage. However, the vigilance and acumen of the Abbasid caliphate in the first Abbasid era dispelled its dreams and undermined its ideas by resolutely confronting it.
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreImage pattern classification is considered a significant step for image and video processing.Although various image pattern algorithms have been proposed so far that achieved adequate classification,achieving higher accuracy while reducing the computation time remains challenging to date. A robust imagepattern classification method is essential to obtain the desired accuracy. This method can be accuratelyclassify image blocks into plain, edge, and texture (PET) using an efficient feature extraction mechanism.Moreover, to date, most of the existing studies are focused on evaluating their methods based on specificorthogonal moments, which limits the understanding of their potential application to various DiscreteOrthogonal Moments (DOMs). The
... Show MoreA particulate composite material was prepared by adding the Titanium dioxide (TiO2) with a particle size of (75-150) µm to Epoxy resin at weight percentage of (10%,20%,30%,40%,50%).The following some mechanical properties were studied,fracture toughness, hardness.casting preparation methods were used in this study includes preparing plate of matrix and composites. specimens were prepared according to ASTM for the Mechanical properties tests. After that Another samples were heat treated for three and six hour at 65C?. Fracture toughness (Kic) represent for stress intensity factor results were showed that the curve of three hours aging increases in fracture toughness (Kic) for composites but for six hours aging increases fracture tough
... Show MoreThat the diplomatic work and its importance in foreign policy planning assumes the following points: 1. Choosing the tool in the sense of choosing the most correct tool that reflects the reality of the situation on the one hand and the disposal of strong energy to reach the implementation of the political decision. The declaration of war and entering into a resolution that uses force merely to face insulting ambassadors does not mean Power of the State concerned. But an imbalance in its foreign policy. 2. The coordination of the tools, that the foreign policy scheme must be such a role, and on the external style, diplomatic work, military action and propaganda must complement each other, to the extent that each of them is the first attac
... Show MoreThe aerodynamic and elastic forces may cause an oscillation of the structure such as the high frequency of the airfoil surfaces and the dynamic instability occurring in an aircraft in flight and failure may occur at a speed called flutter speed. In this work, analytical and numerical investigations of flutter limits of thin plates have been carried out. The flutter speed of rectangular plates were obtained and compared with some published results. Different design parameters were investigated such as aspect ratio, thickness and their effects on flutter velocity. It was found that the structural mode shape plays an important role in the determination of the flutter speed and the coupling between the bending and torsional mode is the main
... Show MoreThis study was carried out to prepare and characterize domperidone nanoparticles to enhance solubility and the release rate. Domperidone is practically insoluble in water and has low and an erratic bioavailability range from 13%-17%. The domperidone nanoparticles were prepared by solvent/antisolvent precipitation method at different polymer:drug ratios of 1:1 and 2:1 using different polymers and grades of poly vinyl pyrolidone, hydroxy propyl methyl cellulose and sodium carboxymethyl cellulose as stabilizers. The effect of polymer type, ratio of polymer:drug, solvent:antisolvent ratio, stirring rate and stirring time on the particle size, were investigated and found to have a significant (p? 0.05) effect on particle size. The best formul
... Show MoreA polycrystalline CdSe thin films doped with (5wt%) of Cu was fabricated using vacuum evaporation technique in the substrate temperature range(Ts=RT-250)oC on glass substrates of the thickness(0.8?m). The structure of these films are determined by X-ray diffraction (XRD). The X-ray diffraction studies shows that the structure is polycrystalline with hexagonal structure, and there are strong peaks at the direction (200) at (Ts=RT-150) oC, while at higher substrate temperature(Ts=150-250) oC the structure is single crystal. The optical properties as a function of Ts were studied. The absorption, transmission, and reflection has been studied, The optical energy gap (Eg)increases with increase of substrate temperature from (1.65
... Show MoreAugust Wilson’s major concern is to communicate the African American cultural awareness; to establish a counter-culture based on self-confidence and assertiveness. He advocates an encouraging attitude to elevate the African Americans’ spiritual consciousness and to teach them how to sublimate their aims in life. He aspires to win the everlasting battle against racial discrimination, oppression, injustice, and identity confusion. Sublimation, as a defense mechanism, will be Wilson’s new ammunition to re-read and to re-interpret the psychic constitution of his people, to help them get out of their self-imposed fences and this is the core of Wilson’s new culture. Sublimation is the process in which the psyche directs the negative drive
... Show MoreKHalaf Alhmar and what we get from his poem
The present work provides a list of all amphibians and reptiles recorded from Iraq up to 2014. It includes 115 species (105 species of reptiles and 10 species of amphibians) dating back to 25 families (20 families of reptiles and 5 families of amphibians). Conservation status of each species was mentioned.