This research deals with a part of our heritage and Arab culture, which is the poetry of contemporary Islamic poets, especially the poetry that was said in the mother in contemporary Islamic poetry, when extrapolating the offices of some contemporary Islamic poets found a clear presence of the mother, and during the search for the subject or its I found that the subject did not receive research and study, although the bureaus of contemporary Islamic poets included in it a huge amount of verses in which they stood at the mother Pharthua, and expressed their feelings and emotions towards them, and accordingly this research tagged (mother in contemporary Islamic poetry _ Dr Artistic models in models of contemporary Islamic poetry) to stand at models of those verses to study and demonstrate the technical skill of poets in the expression of the mother, I have adopted in my study this analytical method, as well as the dependence of various poets.
Background: Many types of instruments and techniques are used in the instrumentation of the root canal system. These instruments and techniques may extrude debris beyond the apical foramen and may cause post-instrumentation complications. The aim of this study was to evaluate the amount of apically extruded debris resulted by using 4 types of nickel-titanium instruments (WaveOne, TRUShape 3D conforming files, Hyflex CM, and One Shape files) during endodontic instrumentation. Materials and methods: Forty freshly extracted human mandibular second premolar with straight canals and a single apex were collected for this study. All teeth were cut to similar lengths. Pre-weighted glass vials were used as collecting containers. Samples were randoml
... Show MoreSome of the issues that have become common in our society recently after the Americans entered our country and were rubbed by some security agencies: obtaining some information from children, and the serious consequences that may lead to the lives of innocent people, became common interrogation of some security agencies and rely on their words.
There are significant cases where their testimony needs to be heard, such as their presence in some places where incidents are not witnessed by others, such as schools or being witnesses to certain crimes.
I saw the study of this case in the light of Sharia and law
La condicionalidad en árabe, supongo como en otras lenguas, constituye una noción amplia que puede expresarse mediante diferentes construcciones sintácticas. La mayor parte de los especialistas coinciden en señalar que las estructuras condicionales son, probablemente, la clase más compleja de expresión compuesta en árabe. Se utilizan para expresar una condición de la que depende la realización de lo expuesto en la oración principal. Las estructuras condicionales son una de las principales vías lingüísticas de las que dispone el individuo para expresar su capacidad de imaginar situaciones diferentes a las reales; de crear mundos posibles; de soñar con situaciones pasadas que podrían haber sido diferentes; de ocultar lo fact
... Show MoreThis study is pointed out to estimate the effectiveness of two solvents in the extraction and evaluating the active ingredients and their antioxidant activity as well as anti-cancer efficiency. Therefore, residues from four different Brassica vegetables viz. broccoli, Brussels sprout, cauliflower, and red cherry radish were extracted using two procedures methods: methanolic and water crude extracts. Methanol extracts showed the highest content of total phenolic (TP), total flavonoids (TF), and total tannins (TT) for broccoli and Brussels sprouts residues. Methanolic extract of broccoli and Brussels sprouts residues showed the highest DPPH· scavenging activity (IC50 = 15.39 and 18.64 µg/ml). The methanol and water ex
... Show MoreIn recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve
... Show MoreThis study aims to design unified electronic information system to manage students attendance in Lebanese French university/Erbil, as a system that simplifies the process of entering and counting the students absence, and generate absence reports to expel students who passed the acceptable limit of being absent, and by that we can replace the traditional way of using papers to count absence, with a complete electronically system for managing students attendance, in a way that makes the results accurate and unchangeable by the students.
In order to achieve the study's objectives, we designed an information syst
... Show MoreDue to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show MoreProducing pseudo-random numbers (PRN) with high performance is one of the important issues that attract many researchers today. This paper suggests pseudo-random number generator models that integrate Hopfield Neural Network (HNN) with fuzzy logic system to improve the randomness of the Hopfield Pseudo-random generator. The fuzzy logic system has been introduced to control the update of HNN parameters. The proposed model is compared with three state-ofthe-art baselines the results analysis using National Institute of Standards and Technology (NIST) statistical test and ENT test shows that the projected model is statistically significant in comparison to the baselines and this demonstrates the competency of neuro-fuzzy based model to produce
... Show MoreThe evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated
... Show More