The makers of strife exist in every era and time. They differ in how these temptations are created and the methods used in doing so. In our modern era, they are more; This is due to the presence of information technology and its easy availability at their fingertips, as well as the spread of social networking sites, which are rapidly spreading among ignorant groups and groups that are deficient in their use. Which led the makers of sedition to exploit these matters and create various temptations and spread them among peoples and societies. Today, we cannot predict the future of humanity in light of this huge amount of temptation. What the Holy Qur’an mentioned about the types of temptations in its noble verses and their embodiment in several craftsmen was only mentioned in order to take a lesson from those verses and reflect on them Or imitate, to identify their creators, and to beware of similar examples wherever and whenever they exist. This is what we sought to prove and clarify by contemplating the verses of the Holy Qur’an regarding this topic. This is what the research concluded, which includes an introduction, two topics, and a conclusion. A prayer from God Almighty to protect us from the evil of temptations and the evil of their makers and to spare our countries and societies from their evils.
This study focuses on studying the effect of reinforced steel in detail, and steel reinforcement (tensile ratio, compression ratio, size, and joint angle shape) on the strength of reinforced concrete (compressive strength) Fc' and searching for the most accurate details of concrete divisions, their behavior, and corner resistance of reinforced concrete joint. The comparison of this paper with previous studies, especially in the studied properties. The conclusions of the chapter are summarized that these effects had a clear effect and a specific effect on the behavior and resistance of the reinforced concrete corner joints under the negative moments and under their influence and the resulting stress conditions. The types of defects that can
... Show MoreAbstract
Objective(s): A descriptive study aimed to determine nurses' knowledge about chest physiotherapy techniques for patients with Corona virus disease and observe the relationship between nurses' knowledge and their socio-demographic characteristics.
Methodology: The study was directed in isolation units of Al- Hussein teaching hospitals in Thi-Qar, Iraq for the period from June 1st, 2022 to November 27th, 2022. Non- probability (purposively) sample comprised 41 nurses. A questionnaire was used for data collection and it consists of two parts: the first part comprises socio demographic features, the second part includes self- administered questionnaire sheet wa
... Show MoreTransmission lines are generally subjected to faults, so it is advantageous to determine these faults as quickly as possible. This study uses an Artificial Neural Network technique to locate a fault as soon as it happens on the Doukan-Erbil of 132kv double Transmission lines network. CYME 7.1-Programming/Simulink utilized simulation to model the suggested network. A multilayer perceptron feed-forward artificial neural network with a back propagation learning algorithm is used for the intelligence locator's training, testing, assessment, and validation. Voltages and currents were applied as inputs during the neural network's training. The pre-fault and post-fault values determined the scaled values. The neural network's p
... Show MoreThis study aimed to incorporate hydroxyapatite nanoparticles (nHA) or amorphous calcium phosphate nanoparticles (nACP) into a self-etch primer (SEP) to develop a simplified orthodontic bonding system with remineralizing and enamel preserving properties.
nHA and nACP were incorporated into a commercial SEP (Transbond™ plus) in 7% weight ratio and compared with the plain SEP as a control. Shear bond strengths (SBS), enamel damage, and adhesive remnant index (ARI) scores were evaluated at 24 h
A Tonido cloud server provides a private cloud storage solution and synchronizes customers and employees with the required cloud services over the enterprise. Generally, access to any cloud services by users is via the Internet connection, which can face some problems, and then users may encounter in accessing these services due to a weak Internet connection or heavy load sometimes especially with live video streaming applications overcloud. In this work, flexible and inexpensive proposed accessing methods are submitted and implemented concerning real-time applications that enable users to access cloud services locally and regionally. Practically, to simulate our network connection, we proposed to use the Raspberry-pi3 m
... Show MorePurpose: The research aims to estimate models representing phenomena that follow the logic of circular (angular) data, accounting for the 24-hour periodicity in measurement. Theoretical framework: The regression model is developed to account for the periodic nature of the circular scale, considering the periodicity in the dependent variable y, the explanatory variables x, or both. Design/methodology/approach: Two estimation methods were applied: a parametric model, represented by the Simple Circular Regression (SCR) model, and a nonparametric model, represented by the Nadaraya-Watson Circular Regression (NW) model. The analysis used real data from 50 patients at Al-Kindi Teaching Hospital in Baghdad. Findings: The Mean Circular Erro
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreNanofluids are proven to be efficient agents for wettability alteration in subsurface applications including enhanced oil recovery (EOR). Nanofluids can also be used for CO2-storage applications where the CO2-wet rocks can be rendered strongly water-wet, however no attention has been given to this aspect in the past. Thus in this work we presents contact angle (θ) measurements for CO2/brine/calcite system as function of pressure (0.1 MPa, 5 MPa, 10 MPa, 15 MPa, and 20 MPa), temperature (23 °C, 50 °C and 70 °C), and salinity (0, 5, 10, 15, and 20% NaCl) before and after nano-treatment to address the wettability alteration efficiency. Moreover, the effect of treatment pressure and temperature, treatment fluid concentration (SiO2 wt%) and
... Show More