جاءت لفظة شيطان في اللغة العربية من الفعل شطن: ويعني الحبل، وقيل الحبل الطويل الشديد الفتل يُستقى به وتُشد به الخيل، والجمع أشطان، وقيل الشيطان فعلان من شاطَ يَشيط إذا هلك وإحترق، قال: الازهري الاول اكثر، قال: والدليل على انه من شَطَنَ قول امية بن ابي الصلت يذكر سليمان النبي (عليه السلام): ايما شاطِنٍ عصاه عَكاه(1)، في حين تطلق لفظة شيطان على الكائن الخارق للطبيعة او الروح، واصلها الاغريقي(دايمونDaimon) ويرد في السومرية تحت لفظة (ماشكيمMaškim)، وتحت لفظة (رابيصوRabisu) في الاكدية والآشورية القديمة(2).
The Andalusi did not leave any poetic art without expressing his psychological and sentimental emotions and the depth of emotions and it sincerity. We found Andalusian translated his emotions into poetry and in many different subjects
ان مرتكزات السياسة الخارجية العراقية لمرحلة ما بعد العام 2003 قد عكست توجهات ايجابية قادت الى صياغة مجموعة من الرؤى والتصورات الاستراتيجية الجديدة التي افضت الى اعتماد وتوظيف الوسائل والقنوات الدبلوماسية بوصفها وسائل فعالة وبطريقة متكاملة ومتوازنة من اجل تعزيز مستويات الاداء الفعلي وتحقيق جميع الاهداف المستقبلية للسياسة الخارجية العراقية في ضوء صياغة معادلة مفادها: تدعيم وترصين اداء مؤسسات صنع السياسة ال
... Show MoreThe article describes a certain computation method of -arcs to construct the number of distinct -arcs in for . In this method, a new approach employed to compute the number of -arcs and the number of distinct arcs respectively. This approach is based on choosing the number of inequivalent classes } of -secant distributions that is the number of 4-secant, 3-secant, 2-secant, 1-secant and 0-secant in each process. The maximum size of -arc that has been constructed by this method is . The new method is a new tool to deal with the programming difficulties that sometimes may lead to programming problems represented by the increasing number of arcs. It is essential to reduce the established number of -arcs in each cons
... Show MoreThe thesis discusses the concept of the new international regionalism that emerged after the growing effects and repercussions of globalization with its economic, political and security dimensions after the end of the Cold War and the crystallization of a different international system dominated by the United States of America, so that the major countries and actors in the international system realize the danger of globalization and move towards adopting regional arrangements to contain the negative effects of globalization. The Asia-Pacific model was chosen as a model for the study.
Women are considered important characters and subjects of discussion in the Glorious Qur’an. Some are portrayed in a positive light while others are condemned . Most women in the Glorious Qur’an are represented as either the mothers or wives of certain leaders and prophets. But the lexical items “Imra’a” امراة and “zawj” زوج occur in the Glorious Qur’an with different meanings depending on the context where they occur.
Translation of the Glorious Qur'an has always been a problematic and difficult issue. Since the Glorious Qur'an is regarded as miraculous and inimitable (i'jaz al-Qur'an), Muslims argue that the Qur'anic text should not be separated from its
... Show MorePvcABCD are cluster of genes found in Pseudomonas aeruginosa. The research was designed to examine the relationship between the pvc genes expression and cupB gene, which plays a crucial role in the development of biofilm, and rhlR, which regulates the expression of biofilm-related genes, and to investigate whether the pvc genes form one or two operons. The aims were achieved by employing qRT-PCR technique to measure the gene expression of genes of interest. It was found that out of 25 clinical isolates, 21 isolates were qualified as P.aeruginosa. Amongst, 18(85.7%) were evaluated as biofilm producers, 10 (47.6%), 5 (23.8%), and 3 (14.2%) were evaluated as strong, moderate and weak producers respectively, while, 3 (14.2%) were considered
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreThe insect is diagnosed and named by the National Center of Biotechnology Information (NCBI), USA as the Mint leaf Beetle Chrysolina herbacea alnadawi (Duftschmid, 1825), (Coleoptera: Chrysomelidae). The diagnosis was performed depending on the DNA analysis by 73% similarity with Chrysolina herbacea (Duftschmid, 1825) sequence, In the present study. It is recorded as a new insect pest on mint plant Mentha puleguim (L,1753) (Lamiaceae). DNA analysis confirmend that it is recorded for the first time in Iraq and the Arab world as well as the Middle East. Those insects were observed initially during August 2017 in residential gardens of Al-Bonooq district in Baghdad / Iraq.
With its rapid spread, the coronavirus infection shocked the world and had a huge effect on billions of peoples' lives. The problem is to find a safe method to diagnose the infections with fewer casualties. It has been shown that X-Ray images are an important method for the identification, quantification, and monitoring of diseases. Deep learning algorithms can be utilized to help analyze potentially huge numbers of X-Ray examinations. This research conducted a retrospective multi-test analysis system to detect suspicious COVID-19 performance, and use of chest X-Ray features to assess the progress of the illness in each patient, resulting in a "corona score." where the results were satisfactory compared to the benchmarked techniques. T
... Show More