This is a search for Al-Rwandiyah and its heretical deviant sects, and its destructive goals that targeted the Arab nation, and its true Islamic religion in order to exhale poisons of demolition and sabotage, leading to its racist, populist goals ( ) that the Magi aspire to to restore the so-called ancient Persian glories, and undermine the Abbasid caliphate.
Al-Biruni said: (And that a person will emerge who will restore the Magian state and seize all the land, and remove the king of the Arabs) (), and among the indications of Ibn Al-Nadim is that a populist man called Muhammad bin Al-Hussein who was turned into Zaidan () was (claiming... the transition of the Islamic state to a state Persia ..... and their religion, which is the religion of the Magians) (), and Ibn Al-Qaddah () had appeared to Zaidan and helped him with money, and helped him with men, so when Zaidan died, the matter became consistent with Ibn Al-Qaddah ().
Al-Baghdadi commented on this and said: (I do not find a Magi on the surface of the earth except that he is a loyalist waiting for their appearance at home, thinking that the king will return to them) Therefore, the destructive movements of their different walks and divergent ideas invested in the doctrine of solutions, reincarnation and interpretation to distort the image of Islam and obliterate the features of the Arab heritage. However, the vigilance and acumen of the Abbasid caliphate in the first Abbasid era dispelled its dreams and undermined its ideas by resolutely confronting it.
Small and Medium Enterprises (SMEs) in Iraq have experienced low performance due to the limited usage of accounting information systems (AIS) and the inability to exploit knowledge of management capabilities (KMC). These deficiencies have led to competitive pressures in the marketplace that have adversely affected their sales and production. This study investigates the role of AIS in terms of operation support, knowledge support, regulatory support, and the role of KMC, including knowledge acquisition, knowledge transfer, and knowledge utilized to enhance organizational performance in Iraqi SMEs. The target population was managers and owners in SMEs using AIS in Iraq’s cities. A non-probability purposive sampling technique was use
... Show MoreAbstract: The article aimed to formulate an MLX binary ethosome hydrogel for topical delivery to escalate MLX solubility, facilitate dermal permeation, avoid systemic adverse events, and compare the permeation flux and efficacy with the classical type. MLX ethosomes were prepared using the hot method according to the Box–Behnken experimental design. The formulation was implemented according to 16 design formulas with four center points. Independent variables were (soya lecithin, ethanol, and propylene glycol concentrations) and dependent variables (vesicle size, dispersity index, encapsulation efficiency, and zeta potential). The design suggested the optimized formula (MLX−Ethos−OF) with the highest desirability to perform the
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More
For criminal investigations, fingerprints remain the most reliable form of personal identification despite developments in other fields like DNA profiling. The objective of this work is to compare the performance of both commercial charcoal and activated carbon powder derived from the Alhagi plant to reveal latent fingerprints from different non-porous surfaces (cardboard, plain glass, aluminum foil sheet, China Dish, Plastic, and Switch). The effect of three variables on activated carbon production was investigated. These variables were the impregnation ratio (the weight ratio of KOH: dried raw material), the activation temperature, and the activation time. The effect factors were investigated using Central Composite Design
... Show MoreIn information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show MoreBackground: In spite of all efforts, Non-small cell lung cancer (NSCLC) is a fatal solid tumor with a poor prognosis as of its high metastasis and resistance to present treatments. Tyrosine kinase inhibitors (TKI) such as erlotinib are efficient in treating NSCLC but the emergence of chemoresistance and adverse effects substantially limits their single use. Objective: in this study, the combination treatments of either 2-deoxy-D-glucose (2DG) or cinnamic acid (CINN) with erlotinib (ERL) were tested for their possible synergistic effect on the proliferation and migration capacity of NSCLC cells. Methods: In this study, NSCLC model cell line A549 was used to investigate the effects of single compounds and their combination on cell gro
... Show MoreThe environmental surfaces hygiene of college premises like classrooms play role in spreading different pathogenic bacteria, furthermore a Medical students are often potential vectors for resistant bacteria to their entourage. This study aimed to assess bacterial contamination and their susceptibility to various antimicrobial agents in the educational classroom of Al-Kindy College of medicine in two classrooms: one occupied by clinical visitor and non-clinical visitor students to evaluate and determine its health risk. In this cross-sectional study, different sites of the educational classroom of Al-Kindy College of medicine were studied. Ninety-sex Different swab samples were collected from 8 different sites of college across bot
... Show MoreThe global rise in temperature and the desert climatic conditions prevalent in Middle Eastern countries have exacerbated rutting distress in heavily trafficked highways. Conventional asphalt binders with a high-temperature performance grade (PG 70) have proven inadequate under such extreme conditions, necessitating the development of modified binders with enhanced high-temperature performance. While polymer modification using styrene-butadiene-styrene (SBS), an elastomeric polymer, and ethylene-vinyl acetate (EVA), a plastomeric polymer, has been widely studied, limited research provides a direct comparison of their effectiveness at both the binder and mixture levels under extremely high-temperature conditions. This study addresses this gap
... Show MoreThis research is a case study to solve control problems in Al Rasheed edible oil factory fire tube boilers. they have hopes to develop a new control system to manage boilers operation. The suggestion is to use Zelio soft programmable relays instead of the unavailable old control units. Operation philosophy was studied through works of literature, operation manuals, and standards. Programmable logic control relay is proposed as an advanced selection than PLC's. Boilers operation is accompanied by operation risks. many boilers were exploded in Iraq for different reasons. Some problems are attributed to manual operation mistakes. Extensive work was done to understand the operation sequence, emergency shutdown, and faults causing the trips. A c
... Show More