The Islamic nation accuses these days of cruelty and extremism, and this is not strange. Every nation comes out
Including the hardline and the extremist, but the self-pity is that these charges have become
It went beyond the example and the mercy of the gift that the Almighty said (and you are to create great)
Al-Qalam: 4, and accusing him of not touching him in dealing with the people of the book and others, so try
It is our humble quest to urge our small speeches to clarify the position of Islam and its Prophet (peace and blessings of Allaah be upon him)
And deal with all human beings, and to show the low level of rights that our prophet has proved
Western laws are parts of his administration and adopted in the field of human rights. Best blessings and peace of the people of the book so that we have defended our religion and prophet who quoted
The multicast technology implements a very high-efficiency point-to-multipoint data transmission over IP networks (IPv4 and IPv6). Multicast reduces network load, eliminates traffic redundancy, and saves network bandwidth. Therefore, multicast used widely in LAN/WAN applications such as online games, video conferencing and IPTV. The multicast technology implements varied protocols such as DVMRP(Distance Vector Multicast Routing Protocol), MOSPF(Multicast Open Shortest Path First), or PIM-DM (Protocol Independent Multicast- Dense Mode) which considered source tree type, while PIM-SM (Protocol Independent Multicast- Sparse Mode) and CBT (Core Based Tree) uses shared tree. Current paper focuses on the performance evaluation of the two multi
... Show MoreA range of macrocyclic dinuclear metal (II) dithiocarbamate-based complexes are reported. The preparation of complexes was accomplished from either mixing of the prepared ligand with a metal ion or through a template one-pot reaction. The preparation of the bisamine precursor was achieved through several synthetic steps. The free ligand; potassium 2,2'-(biphenyl-4,4'-diylbis(azanediyl))bis(1-chloro-2-oxoethane-2,1diyl)bis(cyclohexylcarbamodithioate) (L) was yielded from the addition of CS2 to a bis-amine precursor in KOH medium.A variety of analytical and physical methods were implemented to characterise ligand and its complexes. The analyses were based on spectroscopic techniques (FTIR, UV-Vis, mass spectroscopy and 1H, 13C-NMR sp
... Show MoreIn this work, the dynamic behavior of discrete models is analyzed with Beverton- Holt function growth . All equilibria are found . The existence and local stability are investigated of all its equilibria.. The optimal harvest strategy is done for the system by using Pontryagin’s maximum principle to solve the optimality problem. Finally numerical simulations are used to solve the optimality problem and to enhance the results of mathematical analysis
The goal of this paper is to study dynamic behavior of a sporadic model (prey-predator). All fixed points of the model are found. We set the conditions that required to investigate the local stability of all fixed points. The model is extended to an optimal control model. The Pontryagin's maximum principle is used to achieve the optimal solutions. Finally, numerical simulations have been applied to confirm the theoretical results.
In the latest years there has been a profound evolution in computer science and technology, which incorporated several fields. Under this evolution, Content Base Image Retrieval (CBIR) is among the image processing field. There are several image retrieval methods that can easily extract feature as a result of the image retrieval methods’ progresses. To the researchers, finding resourceful image retrieval devices has therefore become an extensive area of concern. Image retrieval technique refers to a system used to search and retrieve images from digital images’ huge database. In this paper, the author focuses on recommendation of a fresh method for retrieving image. For multi presentation of image in Convolutional Neural Network (CNN),
... Show MoreMercifulness is a trait of civilization, humanity, and a moral value in society, because it has an impact on social life and its role in spreading interdependence, joint liability, and solidarity among people. Mercifulness means spreading mercy, synergy, sympathy, and cooperation. Generally, a society that enjoys strong ties tends to have a kind of stability and development, as well as, is able to face the economic, political, and security crises. Conversely, a weak society leads to weak social cohesion and weak community infrastructure that is more vulnerable to social, economic, and political instability. Thus, this is the aim of the research that has used a social survey method applied to a sample of respondents who have reached (300)
... Show MoreData Driven Requirement Engineering (DDRE) represents a vision for a shift from the static traditional methods of doing requirements engineering to dynamic data-driven user-centered methods. Data available and the increasingly complex requirements of system software whose functions can adapt to changing needs to gain the trust of its users, an approach is needed in a continuous software engineering process. This need drives the emergence of new challenges in the discipline of requirements engineering to meet the required changes. The problem in this study was the method in data discrepancies which resulted in the needs elicitation process being hampered and in the end software development found discrepancies and could not meet the need
... Show MoreNanofiltration (NF) ceramic membrane have found increasing applications particularly in wastewater and water treatment. In order to estimate and optimize the performance of NF membranes, the membrane should be characterized correctly in terms of their basic parameters such as effective pore radius (rp) and equivalent effective thickness as well as effective surface charge ( ), the effective charge density ( ) and Donnan potential ( ). The impact of electrokinetic (zeta) potential on the membrane surface charge density, effective membrane charge density and Donnan potential at two different concentrations of the reference solutions 0.001, 0.01 M sodium chloride at various pH values from 3 to 9, and effective po
... Show MoreAbstract
This research aims to reform the Iraqi public budget through going into the challenges the budget faces in applying item-line budget in its preparation, implementation and control; which encourage extravagance and waste instead of rationalizing expenditures. This is shown in the data analysis of Federal public budget laws in Iraq for the years from 2005 till 2013; there was a continuous increase in the aggregate public expenditures in the public budget for the years previously mentioned, as the public expenditures growth has reached into the percent 284.71% in 2013. In addition the public budget for these years (2005-2013) is being prepared with planned deficit without confirming that
... Show MoreIn modern years, internet and computers were used by many nations all overhead the world in different domains. So the number of Intruders is growing day-by-day posing a critical problem in recognizing among normal and abnormal manner of users in the network. Researchers have discussed the security concerns from different perspectives. Network Intrusion detection system which essentially analyzes, predicts the network traffic and the actions of users, then these behaviors will be examined either anomaly or normal manner. This paper suggested Deep analyzing system of NIDS to construct network intrusion detection system and detecting the type of intrusions in traditional network. The performance of the proposed system was evaluated by using
... Show More