The study of these selected traces shows that what Imam Mardini did on Imam al-Zayla'i and enabled him to graduate the hadiths of the book (guidance and conclusions) as well as in choosing the novel closest to Murad the work and not as described by al-Zayla'i .... never deserves descriptions.
The problem of noise in the Baghdad airport has been examined in this study; and noise measurement and survey studies have been carried out at four high noise level (operation, training and development, quality system, and information and technology) zones located in this region. Noise exposure is a common hazard to workforce in general although at varying degrees depending on the occupation, as many workers are exposed for long periods of time to potentially hazardous noise. A questionnaire was completed by 122 workers during this study in order to determine the physical, physiological, and psycho-social impacts of the noise on workers and to specify what kind of measurements have been taken both by the employers and workers for protection
... Show MoreThe problem of noise in the Baghdad airport has been examined in this study; and noise measurement and survey studies have been carried out at four high noise level (operation, training and development, quality system, and information and technology) zones located in this region. Noise exposure is a common hazard to workforce in general although at varying degrees depending on the occupation, as many workers are exposed for long periods of time to potentially hazardous noise. A questionnaire was completed by 122 workers during this study in order to determine the physical, physiological, and psycho-social impacts of the noise on workers and to specify what kind of measurements have been taken both by the employers and workers for protection
... Show MorePassword authentication is popular approach to the system security and it is also very important system security procedure to gain access to resources of the user. This paper description password authentication method by using Modify Bidirectional Associative Memory (MBAM) algorithm for both graphical and textual password for more efficient in speed and accuracy. Among 100 test the accuracy result is 100% for graphical and textual password to authenticate a user.
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
To explore the durability of some local species of wood to fungal deterioration among the
storage period, this research has conducted on three species Eufcalyptus cammaldulensis,
Juglans regia, presence of some genus of fungi; Aspergillus, Penicillium,Botryoderma,
Chaetomium, Phoma, Cladosporium and Pacilomyces in different intensities.
The two fungi Aspergillus and Penicillium appeared more dominants than others, therefore
they were chosen for the pathogenicity test. The results showed that the two species of fungi
preferred Juglans wood firstly were the size of infection was more than 10 times of any of the
other two woods. Eucalyptus showed similar response to that of Morus, but with Aspergillus
it was few bett
In this paper the centralizing and commuting concerning skew left -derivations and skew left -derivations associated with antiautomorphism on prime and semiprime rings were studied and the commutativity of Lie ideal under certain conditions were proved.