The affliction is a remaining year and not a past incident, and the most evil people are the prophets - peace and blessings be upon them - and the most severe is the Imam of the Prophets Muhammad - may God bless him and grant him peace - because they are exposed to harm from their people because of their call to a religion that violates the religion of parents and grandparents, the religion of injustice and injustice And polytheism and disbelief, and therefore the Qur'an had attitudes towards the entertainment of the people of affliction in general and our beloved - peace be upon him - in particular, this research came about the entertainment of the Qur’an for the Prophet - may God bless him and grant him peace - and many areas of entertainment, including mentioning the stories of the people with their prophets and the outcome of their command from Shame in this world and the hereafter, and to show their prophets on them, including by entertaining him The affliction that the prophets descended from his brothers, as the scourge in the soul, money and the child descended a lot, so they endured what happened to them for the sake of God, and that was one of the most important and most important factors of entertainment for him - upon him prayers and peace-, as well as his entertainment with patience for the great reward of the patient, and the lack of sorrow Because soon it will disappear, and the obstacle to the righteous, and thank God, Lord of the worlds.
In 2020 one of the researchers in this paper, in his first research, tried to find out the Modified Weighted Pareto Distribution of Type I by using the Azzalini method for weighted distributions, which contain three parameters, two of them for scale while the third for shape.This research compared the distribution with two other distributions from the same family; the Standard Pareto Distribution of Type I and the Generalized Pareto Distribution by using the Maximum likelihood estimator which was derived by the researchers for Modified Weighted Pareto Distribution of Type I, then the Mont Carlo method was used–that is one of the simulation manners for generating random samples data in different sizes ( n= 10,30,50), and in di
... Show MoreBackground :The cotton factories have difference steps, spinning and weaving are van important parts of the factories. Cotton industry workers are exposed to various hazards in the different departments of textile factories. The major health problems associated with cotton dust are respiratory problems. Cotton workers display an excess of lung function abnormalities when compared to a community control population.
Aim of Study: This study assessed the effect of exposure to cotton dust in spinning and weaving workers on the lung function in Iraq, by measuring Forced Vital Capacity (FVC),Forced Expiratory Volume in the first second(FEV1), FEV1 ∕ FVC Ratio, and Forced Expiratory Flow 50%(FEF50%),with varying degree of reduction in lung
Moment invariants have wide applications in image recognition since they were proposed.
The current research aims to highlight the role of social networking sites in the dissemination of scientific knowledge and the importance of their use by researchers, and the researcher relied on the descriptive approach and the survey method. Among the data collection tools are the questionnaire and paper and electronic sources. Among the most important results that the research came out with: The number of the subscribers’ sites was (14) sites, and the most used social sites for receiving and Disseminating Scientific knowledge are: Facebook, Telegram, WhatsApp, Viber, Messenger and YouTube. All respondents receive tacit knowledge (Exchange of Messages and News) through social networking sites, and few of them do not receive explicit kn
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MorePerhaps going to watch movies in cinemas today has become different from what it was before. The cinematic film, the clarity of the image and the luster of its colors pulled the rug out from under the most important change that occurred in the structure of the contemporary cinematography, which is the sound. The surround sound environment that immerses viewers in the realism of sound that reaches them from all directions, and for this the researcher found it necessary to shed light on this topic because of its importance, so the research problem was represented in the following question: (How are modern sound systems used in the structure of contemporary feature films?) The theoretical framework included two topics: the first: the dialec
... Show More