Prayer It is the second pillar of Islam, which is what Allaah erases sins, the Prophet, peace be upon him say: "Do you see if the river at the door of you wash it every day five, what it says: it keeps dirt," they said, does not keep the dirt something, He said: «That is like the five daily prayers, Allaah erases sins", Bukhari (1/112), and the places and times supervised thanks to worship them, was to pray at the three mosques (the Grand Mosque and the Prophet's Mosque and the Al-Aqsa Mosque) private virtue from the rest of the mosques and this virtue include the obligatory prayers and Voluntary Prayers
In this work, the effects of size, and temperature on the linear and nonlinear optical properties in InGaN/GaN inverse parabolic and triangular quantum wells (IPQW and ITQW) for different concentrations at the well center were theoretically investigated. The indium concentrations at the barriers were fixed to be always xmax = 0.2. The energy levels and their associated wave functions are computed within the effective mass approximation. The expressions of optical properties are obtained analytically by using the compact density-matrix approach. The linear, nonlinear, and total absorption coefficients depending on the In concentrations at the well center are investigated as a function of the incident photon energy for different
... Show MoreThis study is concerned with the effect of adding two kinds of ceramic materials on the mechanical properties of (Al-7%Si- 0.3%Mg) alloy, which are zirconia with particle size (20μm > P.S ≥ 0.1μm) and alumina with particle size (20μm > P.S ≥ 0.1μm) and adding them to the alloy with weight ratios (0.2, 0.4, 0.6, 0.8 and 1%). Stirring casting method has been used to make composite material by using vortex technique which is used to pull the particles to inside the melted metals and distributed them homogenously.
After that solution treatment was done to the samples at (520ºC) and artificial ageing at (170ºC) in different times, it has been noticed that the values of hardness is increased with the aging time of the o
... Show MoreABSTRACT
The controversy is currently revolving around industrial additives, including antioxidants, their negative effects on consumer health and the emergence of various and various diseases, which led scientists and researchers to intensify most studies on natural antioxidants and their synthesis from medicinal plants mentioned in ancient medicine and in divine books as potential antioxidants of increasing importance. Therefore, this study was designed to synthesize silver nitrate particles from plant leaf extracts (Figs, Olives, and Moringa) and study their effect on bacterial inhibition of each of the undesirable Coliform bacteria (E-Coli,
... Show MoreHydro cracking of heavy oil is used in refinery to produce invaluable products. In this research, a model of hydro cracking reactor has been used to study the behavior of heavy oil in hydro cracking under the conditions recommended by literature in terms lumping of feed and products. The lumping scheme is based on five lumps include: heavy oil, vacuum oil, distillates, naphtha and gases. The first order kinetics was assumed for the conversion in the model and the system is modeled as an isothermal tubular reactor. MATLAB 6.1 was used to solve the model for a five lump scheme for different values of feed velocity, and temperature.
English ابحث عن مقالات و مجلات ... تحليل علاقة ثقافة المنظمة بلازمة من منظور الفردبة - الجماعية أ.د زكـريا مطلك الدوري، أ.د سـعـد علي العـنزي، أ. يعرب عدنان السعيدي مجلة كلية بغداد للعلوم الاقتصادية الجامعة 2009, المجلد 2, العدد 20, الصفحات 107-122 الخلاصة تتعدد وجهات النظر بشأن الاسباب والمعالجات الممكنة للازمات، وان هذا الاختلاف يرجع بالاصل إلى تنوع المداخل التي يعتمد عليها الباحثين في تناول الظاهرة أو الموضوع. وضمن هذا
... Show Moreتناول البحث دراسة خمسة نصوص مسمارية لقروض غير منشورة من سلالة أور الثالثة وتحليلها وترجمتها وهي من مجموعة المتحف العراقي, يعود تاريخها الى زمن سلالة أور الثالثة (2012-2004ق.م) تحديدا الى زمن الملكين شوسين (2037- 2029ق.م) وابي سين (2028-2004 ق.م), اما مضامينها فهي قروض بمادتي الشعير(ثلاثة نصوص) الفضة (نصان), والقروض على نوعين قروض بفائدة (ur5 - ra), وقروض بدون فائدة (maš2 - nu - tuk), وقد حددت نسبة الفائدة في القروض 1/3 33% لمادة الشعير و20% لما
... Show MoreKHalaf Alhmar and what we get from his poem
The using of the parametric models and the subsequent estimation methods require the presence of many of the primary conditions to be met by those models to represent the population under study adequately, these prompting researchers to search for more flexible parametric models and these models were nonparametric, many researchers, are interested in the study of the function of permanence and its estimation methods, one of these non-parametric methods.
For work of purpose statistical inference parameters around the statistical distribution for life times which censored data , on the experimental section of this thesis has been the comparison of non-parametric methods of permanence function, the existence
... Show MoreThe purpose of this preliminary study is to verify the possibility of using Iraqi Zahdi date palm biomass as a resource for biogas production, methane in particular using thermophilic anaerobic digestion with waste water treatment activated sludge. Moreover, is to investigate the influence of extra nutrients addition to the digestion mixture. Biogas was captured in sealed jars with remote sensing modules connected to computer with integrated program to record the gas pressure continuously. A total gas pressure with 67% Methane was produced from date pulp waste fermentation with a yield of 0.57 Lit for each gram volatile solid of substrate. Addition of 1% yeast extract solution as nutrient increased Methane yield in liters by 5.9%. This i
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show More