With the narratives and sayings in the biography of the Prophet and the science of the Koran, Orientalists used this case as a pretext to distort the biography of the Prophet and his character and patience for his call. Researcher in the folds of his research.
A study of taxonomic quality of algae attaching Three concert bridges built on the Tigris River within city of Baghdad including Al-Jadriyah Bridge in Al-Jadriyah area and the Bab Al-Mu'adam Bridge in Al-Shalajiya area, while the third site included Al-Muthanna Bridge in north of Baghdad city, for the period from Autumn 2021 and Winter 2022. The study identified 114 species of 32 Genus in which the predominance of Bacillariophceae (74 species, 14 Genus) Followed by Cyanophyceae (30species, 12 Genus) and 10 species (6 Genus) of Chlorophyceae. The study showed an increase in species of Bacillariophceae, Cyanophyceae which has the ability to secretion gelatinous substances that enable it to stick to solid stand, the number of the larges
... Show MoreOne hundred isolates of Pseudomonas aeruginosa were obtained from patients admitted to Baghdad hospitals, Iraq during the period between May 2018 until July 2018. These isolates were distributed as 15 isolates from blood, 25 isolates from urinary tract infections, 10 isolates from sputum, 12 isolates from wounds, 15 isolates from ear infections, 15 isolates from bronchial wash of patients suffering from respiratory tract infections in addition to 8 isolates from cystic fibrosis patients. The isolates were initially identified by culturing on MacConkey agar, blood agar and P. aeruginosa agar then diagnosed by performing some morphological and biochemical tests. The second diagnosis was done by API 20E system followed by Vitek 2 compact syste
... Show MoreThis research is concerned with the re-analysis of optical data (the imaginary part of the dielectric function as a function of photon energy E) of a-Si:H films prepared by Jackson et al. and Ferlauto et al. through using nonlinear regression fitting we estimated the optical energy gap and the deviation from the Tauc model by considering the parameter of energy photon-dependence of the momentum matrix element of the p as a free parameter by assuming that density of states distribution to be a square root function. It is observed for films prepared by Jackson et al. that the value of the parameter p for the photon energy range is is close to the value assumed by the Cody model and the optical gap energy is which is also close to the value
... Show MoreEnglish has for long been one of the most widely used media of communication globally, especially in the Malaysian universities. It has been termed as a Lingua Franca because it is shared with other languages which are considered first languages by different speakers. For this reason, English as a Lingua Franca (ELF) has attracted a number of researchers to investigate its variety via other languages in various communities. The objective of this paper is therefore to establish the strategies which are employing by the international students at the National University of Malaysia/ UniversitiKebangsaan Malaysia (UKM) as an example of one of the Malaysian universities; when they e
... Show More
Fortieth book is IbnAssaker mechanisms of modern books authored attention appeared amenable to the Messenger of Allah's will (Fife da upon h-d) in his emotional tempting scientists say despite his weakness and preached it save forty Hadith of year necessitated intercession and entering heaven eh Fife FA scientists 1940s h.g. Gae updated combines forty Hadith on a particular topic, authored destinations differed and collected and compiled, the first item in the 1940s that Abdul Rahman Abdullah ibn al-mubaarakmarvzishaikAssaker promised more than thirty workbook in this kind of composition topics varied between consolidation and conversations prove the Almighty Barry qualities, conversations provisions, worship, preaching, and of them only
... Show More<p>Photovoltaic (PV) systems are becoming increasingly popular; however, arc faults on the direct current (DC) side are becoming more widespread as a result of the effects of aging as well as the trend toward higher DC voltage levels, posing severe risk to human safety and system stability. The parallel arc faults present higher level of current as compared with the series arc faults, making it more difficult to spot the series arc. In this paper and for the aim of condition monitoring, the features of a DC series arc fault are analyzed by analysing the arc features, performing model’s simulation in PSCAD, and carrying out experimental studies. Various arc models are simulated and investigated; for low current arcs, the heur
... Show MoreThe current research is concerned with a pragmatic study of attack and defense acts that are used by President Donald Trump in the American Presidential Debate in 2020. Attack is an attempt to harm or defeat someone, and it is a bold message that the speaker or attacker does not like or disagree with the other antagonist. On the contrary, defense means a person responds to an attack of his or her opponent. After an attack, the politician either negates or fact-checks claims made by his opponents or tries to set the record straight. By the end of the study, it is expected to answer the following questions: What are the most frequent strategies of attack and defense that utilized by President Trump to formulate his speech? What are the reason
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show More