Every student and researcher is aware of the practical importance of manuscripts and intellectual need
In order to look at the legacy of the world of thought, this is the book of the fundamentals of religion for knowledge
Al-Razi (d. 606 AH), is included in the book
Very within the total books of doctrine and circulated speech. Q
The thickness of the khongi bush was accurate and reliable, and it was transportation
Accompanied by an extension in the presentation of issues and deepening the places of Khmel if any, and appeared
In support of Al-Razi's pride in most places and most of the issues
Other speech teams from Mu'tazilis and others and presented a general demonstration of knowledge
And the ability to learn about Islamic and philosophical texts
And its owners, and Khongi Basmobh deep speech and his rationalism and accurate speech brilliant
Background: Polycystic ovary syndrome (PCOS) has an unknown and complex etiology. It affects 5–10% of women in the reproductive age. Patients are known to have increased ovarian androgen production that is associated with decreased menses, hirsutism, and acne. Urinary tract stones (UTS) are a multifactorial disorder, with age and sex being known risk factors. Many PCOS patients are obese, and links between nephrolithiasis and obesity have been shown previously. Objectives: To identify the relation between PCOS and UTS considering the patients' body mass index (BMI). Methods: This is a cross-sectional study that enrolled 407 women aged 18-40 who attended the gynecology and obstetrics clinic at Al-Elwiya Maternity Teaching Hospital.
... Show More1,3,4-oxadizole and pyrazole derivatives are very important scaffolds for medicinal chemistry. A literature survey revealed that they possess a wide spectrum of biological activities including anti-inflammatory and antitumor effects.
To describe the synthesis and evaluation of two classes of new niflumic acid (NF) derivatives, the 1,3,4-oxadizole derivatives (compounds 3 and (4A-E) and pyrazole derivatives (compounds 5 and 6), as EGFR tyrosine kinase inhibitors in silico and in vitro.
The designed compounds were synthesized using convent
Field experiment conducted to measure vibrations on three axes longitudinal X, lateral Y and vertical Z on steering wheel, platform tractor and vertical vibration in seat tractor and seat effective amplitude transmissibility (SEAT) factor during operation tillage in silt clay loam soil with depth 18 cm in Baghdad. Split – split plot design under randomized complete block design with three replications least significant design 5 % used. Three factor were used in this experiment included two types of plows included chisel and disc plows which represented main plot, three tires inflation pressure was second factor included 1.1 ,1.8 and 2.7 bar, and three forward speeds of the tillage was third factor included 2.35 , 4.25 and 6.50 km/hr. Resu
... Show MoreModerately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or
... Show MoreFlow-production systems whose pieces are connected in a row may not have maintenance scheduling procedures fixed because problems occur at different times (electricity plants, cement plants, water desalination plants). Contemporary software and artificial intelligence (AI) technologies are used to fulfill the research objectives by developing a predictive maintenance program. The data of the fifth thermal unit of the power station for the electricity of Al Dora/Baghdad are used in this study. Three stages of research were conducted. First, missing data without temporal sequences were processed. The data were filled using time series hour after hour and the times were filled as system working hours, making the volume of the data relativel
... Show MoreIn information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show More