Luqman's story stated that human instinct, if I was brought up properly, reaches wisdom and inflicts the right to everything. It is to go to worship God and adhere to the satisfaction of morals and high morals that are ordered to meet among human beings in this life, because this worship educates in the soul the most beautiful morals needed by human beings of honesty, honesty and modesty, and the work of good and virtues, and distancing the soul from evil and vices.
Laser is a powerful device that has a wide range of applications in fields ranging from materials science and manufacturing to medicine and fibre optic communications. One remarkable
Staphylococcus aureus is a common pathogenic agent due to its ability to cause various types of infections, ranging from mild skin infections to sever systemic diseases. One of the most virulence factors of this bacterium is its ability to from biofilms on solid surfaces by anchoring the planktonic cells and by producing a protective layer of extra polymeric substances. Biofilm formation is controlled through many genes. The most important ones are icaA and icaD. Dentures are prosthetic devices that are made of different materials to replace lost teeth. The aim of this study is to examine the ability of different types of denture materials to support the biofilm formation of S. aureus at phenotypic level by detecting ba
... Show MoreInformation and communication technology has a significant influence on employee procedures. Businesses are investing in e-CRM technologies, yet it is difficult to assess the performance of their e-CRM platforms. The DeLone and McLean Information Systems Success framework can be modified to the current e-CRM assessment difficulties. The new framework's different aspects provide a concise framework for organizing the e-CRM key metrics identified in this study. The purpose of this study is to apply and verify that the Updated DeLone and McLean IS Model can be employed to explain e-CRM adoption among employees, along with the extended Updated DeLone and McLean Model with its five output factors, namely system quality, service quality,
... Show MoreSliver / Sliver chloride is as old used from human but the sliver / sliver chloride nanoparticles have only recently been recogenized. They have used in medicin and agiculture. In the present study have been investigation the effecte biosynthesis Sliver / Sliver chloride nanoparticles as antibacterial by demonstrated that Ag / AgCl NPs arrest the growth of many bacterial: S.typhimurium, k. pneumonia. S. aureus, L.monocytogenes, B. Anthracis, E. coli, C. frundi, S. Pneumonia, P. Aeruginosa. The elements compestion and crystallization panal of biosynthesized nanoparticles were chracterazated by FTIR, XRD and SEM. From XRD, It is confirmed the synthesized nanoparticles contain Sliver / Sliver chloride elements. Synthesized Ag / AgCl NPs showed
... Show MoreThe reservoir characterization and rock typing is a significant tool in performance and prediction of the reservoirs and understanding reservoir architecture, the present work is reservoir characterization and quality Analysis of Carbonate Rock-Types, Yamama carbonate reservoir within southern Iraq has been chosen. Yamama Formation has been affected by different digenesis processes, which impacted on the reservoir quality, where high positively affected were: dissolution and fractures have been improving porosity and permeability, and destructive affected were cementation and compaction, destroyed the porosity and permeability. Depositional reservoir rock types characterization has been identified de
Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show More