The research deals with an important issue that many people are working on, namely the sanctification of the texts on which the timings of the time and the different conditions of the place took place. Do not live up to the ranks of perfection and perfection, and every effort has explanations according to the mind machine, which is not protected by infallibility from error. The great downfall is to put these intellectual efforts in the Bible without separating them from the Word of God. The situation and the place on the adherents of a religion and mixed with the trick of the average individual only to be subject to the words of the teachers of Sharia and docility.
An experimental study is carried out on the effect of vortex generators (Circular and square) on the flow and heat transfer at variable locations at (X = 0.5, 1.5, 2.5 cm) ahead of a heat exchanger with Reynolds number ranging from 62000< Re < 125000 and heat flux from 3000 ≤ q ≤ 8000 W/m2 .
In the experimental investigation, an apparatus is set up to measure the velocity and temperatures around the heat exchanger.
The results show that there is an effect for using vortex generators on heat transfer. Also, heat transfer depends on the shape and location. The circular is found t
... Show MoreThe Islamic Banks including the Iraqi ones are often resorted to support their governance frameworks in order to improve its competitiveness in their communities. Where, those banks are looking for activities that enhance their governance; one of these activities is Shariah Audit that provided the auditing capabilities to face of developmental challenges and increase competitiveness. Therefore, the content of this paper, discusses know-how to use the Shariah Audit and its references in support of the Shariah Governance in the Iraqi Isla
... Show MoreAddressed the problem of the research is marked (experimentation in caves fee) concept and its role in experimentation deviate Display Num formal charges caves. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. Then specify the search for the goals of (revealed the nature and role of experimentation in determining the nature of Manifesting fee documented on the walls of caves), followed by the establishment of the three search limits (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theoretical framework and indicators that resulted from academic theorizi
... Show MoreThe study was performed to isolate and identify the Myxococcus fulvus from the one hundred samples of soils of farms. Special growth conditions had been used to support the growth of M.fulvus local isolates and suppressed the growth of other microorganisms like (Drying , High Temperature , High concentration of antibiotics and specific growth media ) M.fulvus isolates had been subjected to the morphological, cultural , biochemical examination for identification , as well as , study the inhibitory activites of cells and filtrates of localized isolates against some pathogenic fungi include (Trichophyton mentagrophytes , Microsporum gypseum , Aspergillus niger and Fusarium oxyporum ) by using three methods :- Cup assay , well diffusio
... Show MoreBackground: Breast lump is one of the most common prevalent complaint of patients attending breast clinics.
Objective: To determine if there is any change in the pattern of common breast, diseases presenting as breast lumps between pregnant and non-pregnant women among patients attending Al-Elwiya Breast Clinic.
Methods: This is a cross – sectional study, with convent's patient sampling setting in AL-Elwiya Breast Cancer Early Detection Clinic from 1st Feb. to 1st May 2018, we collected data from patients with breast lumps including the age groups, pregnancy status, parity status, previous breast diseases, hormonal drugs, menstrual cycle, breast fe
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show MoreIn this research, main types of optical coatings are presented which are used as covers for solar cells, these coatings are reflect the infrared (heat) from the solar cell to increase the efficiency of the cell (because the cell’s efficiency is inversely proportional to the heat), then the theoretical and mathematical description of these optical coatings are presented, and an optical design is designed to meet this objective, its optical transmittance was calculated using (MATLAB R2008a) and (Open Filters 1.0.2) programs
Metoclopramide (MCP) ion selective electrodes based on metoclopramide-phosphotungstic acid (MCP-PT) ion pair complex in PVC matrix membrane were constructed. The plasticizers used were tri-butyl phosphate (TBP), di-octyl phenyl phosphonate (DOPP), di-butyl phthalate (DBPH), di-octyl phthalate (DOP), di-butyl phosphate (DBP), bis 2-ethyl hexyl phosphate (BEHP). The sensors based on TBP, DOPP, DBPH and DOP display a fast, stable and linear response with slopes 59.9, 57.7, 57.4, 55.3 mV/decade respectively at pH ranged 2-6. The linear concentration range between 1.0×10-5 – 1.0×10-2 M with detection limit 3.0×10-6 and 4.0×10-6 M for electrodes using TBP, DOPP and DBPH while e
... Show MoreCanonical correlation analysis is one of the common methods for analyzing data and know the relationship between two sets of variables under study, as it depends on the process of analyzing the variance matrix or the correlation matrix. Researchers resort to the use of many methods to estimate canonical correlation (CC); some are biased for outliers, and others are resistant to those values; in addition, there are standards that check the efficiency of estimation methods.
In our research, we dealt with robust estimation methods that depend on the correlation matrix in the analysis process to obtain a robust canonical correlation coefficient, which is the method of Biwe
... Show MoreSelf-driving automobiles are prominent in science and technology, which affect social and economic development. Deep learning (DL) is the most common area of study in artificial intelligence (AI). In recent years, deep learning-based solutions have been presented in the field of self-driving cars and have achieved outstanding results. Different studies investigated a variety of significant technologies for autonomous vehicles, including car navigation systems, path planning, environmental perception, as well as car control. End-to-end learning control directly converts sensory data into control commands in autonomous driving. This research aims to identify the most accurate pre-trained Deep Neural Network (DNN) for predicting the steerin
... Show More