330
Number (42) 13 Ramadan 1436 H 30 June 2015
Abu Muhsin al-Thaqafi oscillating between disobedience and obedience
Research Summary
This research deals with the impact of Islam on the poetry of the veterans who realized ignorance and Islam
Persistent and shifting perspective in their poetry, especially those that talk about
Topics deprived of Islam, such as hair, for example. It is known that the description of alcohol is common in
Pre-Islamic poetry, and the Arabs were proud to drink it as proud of their heroism and Frosithm,
And drinking alcohol was associated with religious roots, they thought that the drinker acquires the attributes of God,
He can do the things that gods do, and humans can not. And when he came
Islam; a number of poets remained alcohol, despite the prohibition - and says it
Poetry, and on top of these Abu Muhajin al-Thaqafi, a veteran poet printed, and a knight of
Knights of the Arabs who are ignorant of Islam and ignorance. The browser finds its poetry
His relationship with alcohol has gone through two very different phases, he is in the first stage
A person who rebelled against religious authority, drank alcohol, and enjoyed the mujahideen with madhiyah
And practicing taboo. But this situation did not last forever, and the second stage
The latter, the stage of repentance, emancipation from sin, and full obedience to orders
Religion, and the system of poetry in which the wine, and shows the disadvantages, and calls people to not
Drink it, inspired by the meanings of the verses of the Koran, and is committed to the content that was approved by Islam.
The aim of this investigation is to evaluate the experimental and numerical effectiveness of a new kind of composite column by using Glass Fiber‐Reinforced Polymer (GFRP) I‐section as well as steel I‐section in comparison to the typical reinforced concrete one. The experimental part included testing six composite columns categorized into two groups according to the slenderness ratio and tested under concentric axial load. Each group contains three specimens with the same dimensions and length, while different cross‐section configurations were used. Columns with reinforced concrete cross‐section (reference column), encased GFRP I‐section, and encased steel I‐section were adopted in each
Small and Medium Enterprises (SMEs) in Iraq have experienced low performance due to the limited usage of accounting information systems (AIS) and the inability to exploit knowledge of management capabilities (KMC). These deficiencies have led to competitive pressures in the marketplace that have adversely affected their sales and production. This study investigates the role of AIS in terms of operation support, knowledge support, regulatory support, and the role of KMC, including knowledge acquisition, knowledge transfer, and knowledge utilized to enhance organizational performance in Iraqi SMEs. The target population was managers and owners in SMEs using AIS in Iraq’s cities. A non-probability purposive sampling technique was use
... Show MoreAbstract: The article aimed to formulate an MLX binary ethosome hydrogel for topical delivery to escalate MLX solubility, facilitate dermal permeation, avoid systemic adverse events, and compare the permeation flux and efficacy with the classical type. MLX ethosomes were prepared using the hot method according to the Box–Behnken experimental design. The formulation was implemented according to 16 design formulas with four center points. Independent variables were (soya lecithin, ethanol, and propylene glycol concentrations) and dependent variables (vesicle size, dispersity index, encapsulation efficiency, and zeta potential). The design suggested the optimized formula (MLX−Ethos−OF) with the highest desirability to perform the
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreIn information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show MoreBackground: In spite of all efforts, Non-small cell lung cancer (NSCLC) is a fatal solid tumor with a poor prognosis as of its high metastasis and resistance to present treatments. Tyrosine kinase inhibitors (TKI) such as erlotinib are efficient in treating NSCLC but the emergence of chemoresistance and adverse effects substantially limits their single use. Objective: in this study, the combination treatments of either 2-deoxy-D-glucose (2DG) or cinnamic acid (CINN) with erlotinib (ERL) were tested for their possible synergistic effect on the proliferation and migration capacity of NSCLC cells. Methods: In this study, NSCLC model cell line A549 was used to investigate the effects of single compounds and their combination on cell gro
... Show MoreThe global rise in temperature and the desert climatic conditions prevalent in Middle Eastern countries have exacerbated rutting distress in heavily trafficked highways. Conventional asphalt binders with a high-temperature performance grade (PG 70) have proven inadequate under such extreme conditions, necessitating the development of modified binders with enhanced high-temperature performance. While polymer modification using styrene-butadiene-styrene (SBS), an elastomeric polymer, and ethylene-vinyl acetate (EVA), a plastomeric polymer, has been widely studied, limited research provides a direct comparison of their effectiveness at both the binder and mixture levels under extremely high-temperature conditions. This study addresses this gap
... Show MoreThis research is a case study to solve control problems in Al Rasheed edible oil factory fire tube boilers. they have hopes to develop a new control system to manage boilers operation. The suggestion is to use Zelio soft programmable relays instead of the unavailable old control units. Operation philosophy was studied through works of literature, operation manuals, and standards. Programmable logic control relay is proposed as an advanced selection than PLC's. Boilers operation is accompanied by operation risks. many boilers were exploded in Iraq for different reasons. Some problems are attributed to manual operation mistakes. Extensive work was done to understand the operation sequence, emergency shutdown, and faults causing the trips. A c
... Show MoreThis research aims to understand the mineralogical and geochemical characteristics of the nickel laterite deposit in the East Sulawesi Ophiolite Belt in Wiwirano District, North Konawe, Southeast Sulawesi, Indonesia. The deposit is analyzed and described to determine the laterization process and supergene enrichment. The geochemical data was obtained from X-ray fluorescence analysis, and mineralogical data from petrography and X-ray diffraction analysis. The minerals in the limonite zone are dominated by goethite and hematite. Minerals found in the saprolite zone include quartz, orthopyroxene, and lizardite, whereas the bedrock is made up of olivine, orthopyroxene, serpentine, and chromite. Fe2O3, Al2O3, and Co contents are high in
... Show More