From the responses of Imam Abi Zakaria al-Nawawi 676 AH on the grammarians in his commentary on Sahel Muslim
Thrust blocks and restraint joints are the two most popular methods of counteracting the thrust force that generated at pipe fittings (bends, Tee, wye, reducers, dead ends, etc…). Both systems perform the same function, which is to prevent the joints from separating from the pipes. The aim of the study is to review previous studies and scientific theories related to the study and design of thrust blocks and restraint joints to study the behavior of both systems under thrust force and to study the factors and variables that affect the behavior of these systems. The behavior of both systems must be studied because they cannot be abandoned, as each system has conditions whose use is more feasible, scientific, and economic
... Show MoreA total of 72 specimens of the wild jungle cat Felis chaus furax De Winton, 1898 were
examined for the purpose of this study. The results show that 55.6% of the sample harbored
either single or mixed infections with ecto- and/ or endoparasites. The mode of infection
shows that only four specimens( 5.6% of the total sample) acquire single infections, the
double infections comprise 15.3%, the triple infections comprised 33.3%, while the
quadruplicate infections comprised 1.4%.
The systematic list of the parasites included six ectoparasites: Ctenocephalides felis (insect),
Sarcoptes scabiei (mite), Haemaphysalis adleri, Rhipicephalus leporis, Rhipicephalus
turanicus and Hyalomma anatolicum excavatum (ticks) and seven
COVID-19 is a disease caused by a coronavirus spread globally, including in Iraq; infections have appeared on all Iraq lands in varying proportions. Iraq is among the higher infected world countries. Forty-six infections were simulated on 23 March 2020. Injuries on the eastern side of Baghdad city and to the right side of the Tigris River, which divides the city into two parts, are a natural barrier in quarantine and easily control the movement of people from both sides.
In this study, a model was considered a scientific and practical method by following the steps of identifying infected people using the best scientific approach for the spatial process to prevent the virus from spreading. Remote sensing techniques were
... Show MoreSM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
HM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023
The definition of orthogonal generalized higher k-derivation is examined in this paper and we introduced some of its related results.
<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreThis paper proposed to build an authentication system between business partners on e-commerce application to prevent the frauds operations based on visual cryptography shares encapsulated by chen’s hyperchaotic key sequence. The proposed system consist of three phases, the first phase based on the color visual cryptography without complex computations, the second phase included generate sequence of DNA rules numbers and finally encapsulation phase is implemented based on use the unique initial value that generate in second phase as initial condition with Piecewise Linear Chaotic Maps to generate sequences of DNA rules numbers. The experimental results demonstrate the proposed able to overcome on cheating a
... Show More