The affliction is a remaining year and not a past incident, and the most evil people are the prophets - peace and blessings be upon them - and the most severe is the Imam of the Prophets Muhammad - may God bless him and grant him peace - because they are exposed to harm from their people because of their call to a religion that violates the religion of parents and grandparents, the religion of injustice and injustice And polytheism and disbelief, and therefore the Qur'an had attitudes towards the entertainment of the people of affliction in general and our beloved - peace be upon him - in particular, this research came about the entertainment of the Qur’an for the Prophet - may God bless him and grant him peace - and many areas of entertainment, including mentioning the stories of the people with their prophets and the outcome of their command from Shame in this world and the hereafter, and to show their prophets on them, including by entertaining him The affliction that the prophets descended from his brothers, as the scourge in the soul, money and the child descended a lot, so they endured what happened to them for the sake of God, and that was one of the most important and most important factors of entertainment for him - upon him prayers and peace-, as well as his entertainment with patience for the great reward of the patient, and the lack of sorrow Because soon it will disappear, and the obstacle to the righteous, and thank God, Lord of the worlds.
Ficus (FIC) leaf extract used as corrosion inhibitor for carbon steel alloy (C.S) in two corrosive environments (saline and acidic) with four concentrations (1, 2, 3 and 4 ppm) at varied temperature range between (298-328 K) using electrochemical polarization measurements. The importance of this work focused on the use the green chemistry that is far from the chemical materials effect. The results of polarization presented the FIC inhibitor consider a mixed type (anodic and cathodic) inhibitor. Tafel curve used to evaluate the corrosion inhibition activity. In a saline medium, the best inhibitor efficiency reaches to (87%) in 2 ppm and IE% reach to (99%) for HCl medium inhibited by 1ppm. Langmuir isotherm obeys the study by thermodynamic pa
... Show MoreAbstract Background: Timely diagnosis of periodontal disease is crucial for restoring healthy periodontal tissue and improving patients’ prognosis. There is a growing interest in using salivary biomarkers as a noninvasive screening tool for periodontal disease. This study aimed to investigate the diagnostic efficacy of two salivary biomarkers, lactate dehydrogenase (LDH) and total protein, for periodontal disease by assessing their sensitivity in relation to clinical periodontal parameters. Furthermore, the study aimed to explore the impact of systemic disease, age, and sex on the accuracy of these biomarkers in the diagnosis of periodontal health. Materials and methods: A total of 145 participants were categorized into three groups based
... Show MoreIn this paper, the structure of and have been introduced and studied. We also obtain that a is of a if and only if there exists an on such that . In addition, we obtain that of if and only if there is an on such that , where are subspaces of with eigenvalues 1 and −1, respectively. We also find t that the existence of on implies that there exists a compatible under appropriate condition.
Background: Opportunistic viral infections make an important threat to renal transplantation recipients (RTRs), and with the use of more intense newly-developed immunosuppressive drugs; the risk of renal allograft loss due to reactivation of these viruses has increased considerably. At the top priority of these viruses lie BK polyomavirus (BKV) and human cytomegalovirus (CMV). Reactivation of these viruses in these chronically immunosuppressed RTRs can lead to renal impairment and subsequently allograft loss, unless early detected and properly treated. Objectives: The study aimed to detect and quantify plasma viral load of BKV and CMV in RTRs using quantitative real time PCR (qRT-PCR), in order to study the prevalence of these two viruses i
... Show MoreWellbore instability is one of the major issues observed throughout the drilling operation. Various wellbore instability issues may occur during drilling operations, including tight holes, borehole collapse, stuck pipe, and shale caving. Rock failure criteria are important in geomechanical analysis since they predict shear and tensile failures. A suitable failure criterion must match the rock failure, which a caliper log can detect to estimate the optimal mud weight. Lack of data makes certain wells' caliper logs unavailable. This makes it difficult to validate the performance of each failure criterion. This paper proposes an approach for predicting the breakout zones in the Nasiriyah oil field using an artificial neural network. It
... Show MoreDeriving land cover information from satellite data is one of the most common applications employed to monitor, evaluate, and manage the environment. This study aims to detect the land cover/land use changes and calculate the areas of different land cover types in Baghdad, Iraq, for the period from 2015 to 2020, using Landsat 8 images. The supervised Maximum Likelihood Classification (MLC) method was applied to classify the images. Four land cover types were obtained, namely urban, vegetation, water, and barren soil. Changes in the four land cover classes during the study period were observed. The extent of the urban, vegetation, and water areas was increased by about 7.5%, 9.5%, and 1.5%, respectively, whereas t
... Show MoreProtecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa
... Show MoreIn light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show More