The Islamic nation accuses these days of cruelty and extremism, and this is not strange. Every nation comes out
Including the hardline and the extremist, but the self-pity is that these charges have become
It went beyond the example and the mercy of the gift that the Almighty said (and you are to create great)
Al-Qalam: 4, and accusing him of not touching him in dealing with the people of the book and others, so try
It is our humble quest to urge our small speeches to clarify the position of Islam and its Prophet (peace and blessings of Allaah be upon him)
And deal with all human beings, and to show the low level of rights that our prophet has proved
Western laws are parts of his administration and adopted in the field of human rights. Best blessings and peace of the people of the book so that we have defended our religion and prophet who quoted
Antimagic labeling of a graph with vertices and edges is assigned the labels for its edges by some integers from the set , such that no two edges received the same label, and the weights of vertices of a graph are pairwise distinct. Where the vertex-weights of a vertex under this labeling is the sum of labels of all edges incident to this vertex, in this paper, we deal with the problem of finding vertex antimagic edge labeling for some special families of graphs called strong face graphs. We prove that vertex antimagic, edge labeling for strong face ladder graph , strong face wheel graph , strong face fan graph , strong face prism graph and finally strong face friendship graph .
This paper studies the existence of positive solutions for the following boundary value problem :-
y(b) 0 α y(a) - β y(a) 0 bta f(y) g(t) λy    ï‚¢ï€
The solution procedure follows using the Fixed point theorem and obtains that this problem has at least one positive solution .Also,it determines ( ï¬ ) Eigenvalue which would be needed to find the positive solution .
In this research the performance of 5G mobile system is evaluated through the Ergodic capacity metric. Today, in any wireless communication system, many parameters have a significant role on system performance. Three main parameters are of concern here; the source power, number of antennas, and transmitter-receiver distance. User equipment’s (UEs) with equal and non-equal powers are used to evaluate the system performance in addition to using different antenna techniques to demonstrate the differences between SISO, MIMO, and massive MIMO. Using two mobile stations (MS) with different distances from the base station (BS), resulted in showing how using massive MIMO system will improve the performance than the standar
... Show MoreThe Iraqi sports journalism has paid great attention to sports events through press coverage of all its forms and arts, especially the coverage of the World Cup of football which is one of the most watched events in the world. Thousands of journals are preparing for the immediate coverage of such event which is a daunting task in itself. Newspapers have devoted a wider space to this great event in its pages as well as the weakly sports newspapers work on issuing a daily special issue. The importance of this research sheds light on the coverage of major events such as World Cup in Iraqi newspapers. The topic is new
... Show MoreThe aim of this study was to identify the depth of the mouth and its shape in some local fish belonging to the Cyprinidae family, and the extent to which the depth of the mouth is related to the way of feeding and the nature of food as well as the feeding habits of those species collected specifically from the Tigris River, the results showed a relationship of depth oral cavity with head length was highly significant at (P < 0.01) for all studied species. Also, there was a highly significant relationship between the height of the pharyngeal tooth-bearing bone and the depth of the oral cavity for fish of this local family.
In this work the structural, optical and sensitive properties of Cerium - Copper oxide thin film prepared on silicon and glass substrate by the spray pyrolysis technique at a temperature of (200, 250, 300 °C). The results of (XRD) showed that all the prepared films were of a polycrystalline installation and monoclinic crystal structure with a preferable directions was (111) of CuO. Optical characteristics observed that the absorption coefficient has values for all the prepared CuO: Ce% (104 cm-1) in the visible spectrum, indicating that all the thin films prepared have a direct energy gap. Been fabrication of gas sensors of (CuO: Ce %) within optimum preparation conditions and study sensitivity properties were examined her exposed to ni
... Show MoreIntroduction: Breast cancer is a significant global health concern, affecting millions of women worldwide. While advancements in diagnosis and treatment have improved survival rates, the impact of this disease extends beyond physical health. It also significantly influences a woman's lifestyle and overall well-being. Objectives: The current study intends to analyze the lifestyle of breast cancer patients who are receiving therapy or are being followed up at the Oncology Teaching Hospital in Medical City, Baghdad, Iraq. Method: The present study uses a descriptive design with an application of an evaluation approach. A convenience sample of 100 women with breast cancer was selected from the Teaching Oncology Hospital at the Medical C
... Show MoreAssume that is a meromorphic fuction of degree n where X is compact Riemann surface of genus g. The meromorphic function gives a branched cover of the compact Riemann surface X. Classes of such covers are in one to one correspondence with conjugacy classes of r-tuples ( of permutations in the symmetric group , in which and s generate a transitive subgroup G of This work is a contribution to the classification of all primitive groups of degree 7, where X is of genus one.
The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show More