The present study introduces description of a new species of class Ostracoda genus Hemicypris Sars, 1903. External morphological characters particularly shape, size and structure of left and right valves of carapace and body appendages were discussed and illustrated. Locality and date of collection were given.
This work includes the synthesis of some new five- seven heterocyclic rings derived from benzenesulfonylhydrazide as starting material. Its condensation with 4-methoxy and 4nitro benzaldehyde gives the Schiff bases (1a,b). Schiff bases were reacted with cyclic anhydrides given Oxazepine, Thiazepine derivatives(2,3,4 a,b)(seven membered ring) and with 2-mercapto benzoic acid gives thiazine derivatives (6a,b)(six membered ring) finally with thioglycolic acid give thiazolidine ring(five membered ring) scheme(3). The synthesized compounds have been characterized by melting points,FT-IR, 1H-NMR spectroscopy ,13CNMR and Elemental analysis. some of synthesized compounds were tested for their antibacterial activity
... Show MoreRadar is the most eminent device in the prolonged scattering era The mechanisms involve using electromagnetic waves to take Synthetic Aperture Radar (SAR) images for long reaching. The process of setting edges is one of the important processes used in many fields, including radar images, which assists in showing objects such as mobile vehicles, ships, aircraft, and meteorological and terrain forms. In order to accurately identify these objects, their edges must be detected. Many old-style methods are used to isolate the edges but they do not give good results in the determination process. Conservative methods use an operator to detect the edges, such as the Sobel operator which is used to perform edge detection where the edge does
... Show MoreThis paper presents a fully computerized method to backup the router configuration file. The method consists of a friendly graphical interface programmed by Java programming language.
The proposed method is compared with the two existing methods, namely: TFTP server method and Copy/Paste method. The comparison reveals that the proposed method has many advantages over the existing ones. The proposed method has been implemented on Cisco routers (series 2500, 2600 and 2800).
The issue of the development of Qur'anic studies for the tasks, and the first thought of minds and multiple understandings, and the most precious ideas, and the alternatives were floated, and varied visions, especially as we live in an era exploding knowledge, and complicate secretions, and scramble his ideas, and to devise intellectual approaches To achieve the witnesses of civilization in the words of the Almighty (to be martyrs on the people) Surat Al - Baqarah / 143 attendance and participation in the achievement and a positive interaction with the participants of humanity and civilization in the light of the meaning (to know) rooms / 13.
Therefore, we must emerge from the one-dimensional view of the Koran to the complex mindset t
The aim of the current research is to study a topic from the Qur’anic topics, few have researched it and realized its content, so people knew it in one name in the Qur’an in another name, and due to the ancientity of the topic and its contemporaneity, I wanted to write about it. The research has an introduction, three demands, and a conclusion with the most important results of the research:
As for the introduction: It was to indicate the importance of the topic and an optional reason for it.
As for the first requirement: it included the definition of reasoning, its divisions, and its characteristics.
As for the second requirement, it was to indicate the meaning, types, and methods of labeling it.
As for the third require
Community peace is achieved in law-based states Constitutional institutions with competence and powers, and otherwise that peace is shaken and begins to collapse. The movement of individuals and groups in the State is regulated by law The law and its proper application without selectivity or exception, and then the sense of equal opportunity and equal rights grows every citizen looks at his spouse, what he has, and when he is unbalanced, a sense of frustration and stealing of rights is generated Societal peace suffers from the shocks of instability and what is reflected in the surrounding environment. Instead of production, demolition takes place, which impedes the achievement of the required peace.
... Show MoreThis dissertation studies the application of equivalence theory developed by Mona Baker in translating Persian to Arabic. Among various translation methodologies, Mona Baker’s bottom-up equivalency approach is unique in several ways. Baker’s translation approach is a multistep process. It starts with studying the smallest linguistic unit, “the word”, and then evolves above the level of words leading to the translation of the entire text. Equivalence at the word level, i.e., word for word method, is the core point of Baker’s approach.
This study evaluates the use of Baker’s approach in translation from Persian to Arabic, mainly because finding the correct equivalence is a major challenge in this translation. Additionall
... Show MoreIn this study terpolymer resin ) p-ABBF) was prepared by condensation of (p-amino benzoic acid) and (Biuret) with formaldehyde in (1:1:3) mol ratio using hydrolic acid as a reaction medium at 130±2 ℃ .The synthesized terpolymer resin was characterized by elemental analysis , FT-IR and (1H-NMR) spectroscopy. The intrinsic viscosity was determined. The thermal stability of the terpolymer was analyzed by (TGA and DSC).The morphological feature of the (p-ABBF) terpolymer resin was studied by scanning electron microscopy (SEM).Bach equilibrium method was employed to study analytical efficiency of the terpolymer resin towards certain trivalent and divalent metal ions such as (Cu+2,Ni+2, Co+2,Zn+2,Cd+2 and Cr+3( where thes
... Show MoreCryptographic applications demand much more of a pseudo-random-sequence
generator than do most other applications. Cryptographic randomness does not mean just
statistical randomness, although that is part of it. For a sequence to be cryptographically
secure pseudo-random, it must be unpredictable.
The random sequences should satisfy the basic randomness postulates; one of them is
the run postulate (sequences of the same bit). These sequences should have about the same
number of ones and zeros, about half the runs should be of length one, one quarter of length
two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones
should be the same. These properties can be measured determinis
The paper probes into minute identification of the data of the methods followed in the electronic newspapers that aim to promote terrorist organizations like Al Qaeda and ISIS to draw emotional empathy and sympathy with them.
The paper aims at identifying:
How emotional empathy was utilized by terrorists in E-newspapers.
How useful utilizing emotional empathy was in attracting supporters. The sample that is used in the paper is based on the opening articles of E-newspapers that propagate Al Qaeda and ISIS, e.g. (Sawtu el jihad) “The Sound of Fighting in the Name of God”, (Mua’skar el Battar wal Shamikha wal Khansaa) “Camps of Al Battar, Shamika, and Khansaa”, “Inspire” and (Thurwatu el Sanam, Dabiq, and Rumiyah)