Evil pervades the narrative scene in Tolkien. Hence; his major themes in The Lord of the Rings are shown to be the Evil Nature of Power, the Tyranny of Technology and War as a Destructive Agent. Evil is not as powerful as good. The Boethian conception of evil comes through evil beings such as Melkor Morgoth in The Silmarillion or Sauron ,who cannot do good things but only pervert or mock things; In The Lord of the Rings; Tolkien seems to suggest that there is no absolute evil. The other conception of evil is the Manichaen, a conception which receives more emphasis in Tolkien's trilogy and which sees the world as a battle-ground for warring forces of good and evil. Tolkien frequently personifies the Ring as if it were acting with a will of i
... Show MoreFerric oxide nanoparticles Fe3O4NPs have been prepared by the coprecipitation method, which were used to functionalize the surface of electrospun nanofibers of polyacrylonitrile to increase their effectiveness in adsorption of Congo red (CR) dye from their aqueous solutions. The effect factors of adsorption were systematically investigated such as adsorbent mass, initial concentration, contact time, temperature, ionic strength and pH. The maximum adsorbed amount of the dye was at 0.003g of adsorbent. The adsorption of dye increased with increasing initial dye concentration and the system reaches to the equilibrium state at 150 min. The adsorbed dye capacity decreases with increasing temperature which indicates to the exothermic nature of ad
... Show MoreFor poets to pay a great attention to the Islamic figures and their symbolism in Islam come as a prominent phenomenon in our literature . As there is an impact of them on the brilliant history commemorated by littérateurs . As a matter of fact ، the chronicle of Imam Ali Ibin Abi Talib (peace be upon him) falls in the orbit of the focus Ibn Abi Al-Hadid Al-Mu'tazili steers to in his poems . The current research study is to trace the portrayal of Imam Ali (peace be upon them) in the poetry of Ibn Abi Al-Hadid Al-Mu'tazili ، Seventh Alwiite Poems ، as there is no a study tacking such a conjecture before. In the article there are two axes : the introduction comes as first axis portraying Imam Ali Ibn Abi Talib (peace be upon him) in the wa
... Show MoreThe research was conducted in one of the fields of the Department of Plant Production in the desert region (tomato development project) affiliated with the Directorate of Agriculture of the Holy Karbala Governorate for the purpose of studying the effect of spraying the shoots of the Kohlrabi plant (hybrid) with the Nano biopolymer (Chitosan) and the Azotobacter bio inoculum on the roots of the plant seedlings in terms of growth indicators and yield for the autumn agricultural season. 2023-2024 ,The means were compared according to the Duncan multiple ranges test at significant to level of 0.05.with R.C.B.D . The first factor was spraying the shoots with Nano- Chitosan at a concentration of (0, 1, and 2) g L-1, two weeks after transplanting,
... Show MoreObjectives To tailor composites of polyethylene–hydroxyapatite to function as a new intracanal post for the restoration of endodontically treated teeth (ETT). Methods Silanated hydroxyapatite (HA) and zirconium dioxide (ZrO2) filled low-density polyethylene (LDPE) composites were fabricated by a melt extrusion process and characterised using infrared spectroscopy (FTIR), differential scanning calorimetry (DSC) and dynamic mechanical analysis (DMA). The flexural strength and modulus were determined in dry state and post ageing in simulated body fluid and fractured surfaces analysed by SEM. The water uptake and radiographic appearance of the experimental composites were also measured and compared with a commercially known endodontic fibre
... Show MoreThe elbow joint is one of the important and mobile joints in a way that allows it to perform its functions. The injury occurs when the joint tendon and arm muscles are subjected to repeated partial ruptures as a result of excessive and repetitive work, as well as the patient not being subjected to correct rehabilitation programs, and only rest. From here, the researchers decided to study this problem by preparing rehabilitation exercises accompanying ultrasound and assessing their impact on the rehabilitation of the elbow joint. The sample included male patients aged 30-40 years, and the tests were determined, which included testing the range of motion of the elbow joint from the flexion position and the rotation outward position, the mu
... Show MoreA new human-based heuristic optimization method, named the Snooker-Based Optimization Algorithm (SBOA), is introduced in this study. The inspiration for this method is drawn from the traits of sales elites—those qualities every salesperson aspires to possess. Typically, salespersons strive to enhance their skills through autonomous learning or by seeking guidance from others. Furthermore, they engage in regular communication with customers to gain approval for their products or services. Building upon this concept, SBOA aims to find the optimal solution within a given search space, traversing all positions to obtain all possible values. To assesses the feasibility and effectiveness of SBOA in comparison to other algorithms, we conducte
... Show MoreVarious methods are utilized providing complexity for cryptosystem with the aim to increase the security and avoiding hacker attack. Hybrid cryptosystem is one of these cryptosystems which is used two types of cryptosystems and has many applications in data transmitted. This research, proposed a novel method that used power exponent instead of using the prime number directly and also providing complexity of asymmetric cryptosystems. This method has been applied theoretically in two public systems RSA and EL-Gamal. Power RSA and Power EL-Gamal are modified asymmetric cryptosystems, in which the power number is kept by the sender and the receiver. Moreover, we use group theory to prove that these cryptosystems work properly. Our exten
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More