Praise be to God, Lord of the worlds, and peace and blessings be upon our master Muhammad, and upon his family and companions as a whole. Now, the research deals with the grammatical issues mentioned in the Book of Al-Zahir in the meanings of people's words to Abu Bakr Al-Anbari (d. 328 AH). Two parts of the book have more than one edition, it was printed by the Iraqi Ministry of Culture and Information Beirut in 1979 AD, and the Al-Resala Foundation issued the second edition in 1992 AD The third edition was printed in Dar Al-Bashaer in Damascus in the year 2003 AD and it was the reliance on the research and the grammatical issues were arranged on topics that are: interrogation - Deletion, exclusion, marbling, call and Wallace Relief and the names of verbs and every topic in which I dealt with the linguistic and idiomatic meaning and then its application in the Book of Al-Zahir and this application may be an example or poetry and I have attributed - most of it to his saying and the Book of Al-Zahir was a representative of the Kufic grammar as he mentioned the grammarians of Kufa in places that exceed the places where he mentioned the grammar of Basra he mentioned The fur is in more than two hundred places, and Sibawayh is mentioned in only five places. Our last prayer is that praise be to God, Lord of the worlds.
To evaluate the bioactivity and the cytocompatibility of experimental Bioglass-reinforced polyethylene-based root-canal filling materials. The thermal properties of the experimental materials were also evaluated using differential scanning calorimetry, while their radiopacity was assessed using a grey-scale value (GSV) aluminium step wedge and a phosphor plate digital system. Bioglass 45S5 (BAG), polyethylene and Strontium oxide (SrO) were used to create tailored composite fibres. The filler distribution within the composites was assessed using SEM, while their bioactivity was evaluated through infrared spectroscopy (FTIR) after storage in simulated body fluid (SBF). The radiopacity of the composite fibres and their thermal properties were
... Show MoreObjective: Preparing training in a diverse style for young basketball players, and identifying the effect of training in a diverse style on some physical abilities (for young basketball players).Research methodology: the researchers chose the experimental method to know the research problem and its objectives, as it is represented by designing two equal groups, the control and the experimental, with pre- and post-tests. The study community was determined by youth basketball players for the 2023-2024 season, as the research community is (104) players, and a sample of (20) players was drawn from the youth category from Al-A'dhamiyah Sports Club, and it was chosen intentionally because they are the clubs most committed to training, as
... Show MoreBackground: Adipose derived-mesenchymal stem cells have been used as an alternative to bone marrow cells in this study. Objective: We investigated the in vitro isolation, identification, and differentiation of stem cells into neuron cells, in order to produce neuron cells via cell culture, which would be useful in nerve injury treatment. Method: Mouse adipose mesenchymal stem cells were dissected from the abdominal subcutaneous region. Neural differentiation was induced using β-mercaptoethanol. This study included two different neural stage markers, i.e. nestin and neurofilament light-chain, to detect immature and mature neurons, respectively. Results: The immunocytochemistry results showed that the use of β-mercaptoethanol resulted in
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More