From the responses of Imam Abi Zakaria al-Nawawi 676 AH on the grammarians in his commentary on Sahel Muslim
This study aimed to isolate and identify Cryptococcus species from three distinct sources: sputum samples of pigeon fanciers, dried pigeon droppings, and eucalyptus tree leaves. A total of 150 specimens were collected over a two-month period, comprising 50 samples each from human sputum, pigeon droppings collected across various areas of Baghdad, and eucalyptus leaves obtained from the Baghdad College of Veterinary Medicine. All samples were cultured on Sabouraud dextrose agar supplemented with chloramphenicol and incubated at 25°C for 2–3 days. From the initial cultures, 20 isolates presumptively identified as Cryptococcus spp. were obtained: 6 isolates (12%) from human sputum, 9 isolates (18%) from pigeon droppings, and 5 isol
... Show MoreFree radicals are reactive compounds, their excessive production is considered to be an important cause of oxidative damage in biomolecules causing degenerative diseases. Polyphenols are one of the most important groups of secondary metabolites of plants, which have an antioxidant activity depending on their properties as hydrogen donors. Echinops polyceras Boiss. (Asteraceae) is one of Echinops genus species that spread in Syria, Lebanon, and Palestine. Phytochemicals found in this species leaves have been extracted with gradient polarity solvents, and primary screening of the secondary metabolites was established. The phenolic compounds and flavonoids contents were determined. The free radicals scavenging act
... Show MoreFluconazole was used to test the susceptibility of Candida albicans isolated from different clinical samples, and to detect mutations in ERG11 gene, and their relationship to fluconazole resistance. Forty-eight isolates of Candida albicans were tested for susceptibility using the disc diffusion method (M-44). ERG11 genes of six isolates were amplified (four resistant, two susceptible) and sequenced. The sequenced genes were analyzed to detect the mutations. Out of 48 isolates of Candida albicans, 4 (8%) were resistant to fluconazole. Sixteen-point mutations were detected included 13 silent mutations, and three missense mutations. The mutations of A945C (E266D) and G1609A (V488I) were found only in susceptible Candida albicans isolates, whil
... Show MoreThe research aims to identify the theoretical framework of technical reserves in the insurance activity and the role of the auditor in verifying the integrity of the estimates of technical provisions (technical reserves) for the branches of general insurance in insurance companies based on the relevant international auditing standards, as a proposed audit program has been prepared in accordance with international auditing standards that enable the auditor to express a sound opinion on the fairness of the financial statements of these companies , The research has reached many conclusions, the most important of which is the existence of deficiencies in the audit procedures of insurance companies, as the audit program of those companies did
... Show MoreEstimations of average crash density as a function of traffic elements and characteristics can be used for making good decisions relating to planning, designing, operating, and maintaining roadway networks. This study describes the relationships between total, collision, turnover, and runover accident densities with factors such as hourly traffic flow and average spot speed on multilane rural highways in Iraq. The study is based on data collected from two sources: police stations and traffic surveys. Three highways are selected in Wassit governorate as a case study to cover the studied locations of the accidents. Three highways are selected in Wassit governorate as a case study to cover the studied locations of the accidents. The se
... Show MoreAn experimental study on a KIA pride (SAIPA 131) car model with scale of 1:14 in the wind tunnel was made beside the real car tests. Some of the modifications to passive flow control which are (vortex generator, spoiler and slice diffuser) were added to the car to reduce the drag force which its undesirable characteristic that increase fuel consumption and exhaust toxic gases. Two types of calculations were used to determine the drag force acting on the car body. Firstly, is by the integrating the values of pressure recorded along the pressure taps (for the wind tunnel and the real car testing), secondly, is by using one component balance device (wind tunnel testing) to measure the force. The results show that, the avera
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreA submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show More