The makers of strife exist in every era and time. They differ in how these temptations are created and the methods used in doing so. In our modern era, they are more; This is due to the presence of information technology and its easy availability at their fingertips, as well as the spread of social networking sites, which are rapidly spreading among ignorant groups and groups that are deficient in their use. Which led the makers of sedition to exploit these matters and create various temptations and spread them among peoples and societies. Today, we cannot predict the future of humanity in light of this huge amount of temptation. What the Holy Qur’an mentioned about the types of temptations in its noble verses and their embodiment in several craftsmen was only mentioned in order to take a lesson from those verses and reflect on them Or imitate, to identify their creators, and to beware of similar examples wherever and whenever they exist. This is what we sought to prove and clarify by contemplating the verses of the Holy Qur’an regarding this topic. This is what the research concluded, which includes an introduction, two topics, and a conclusion. A prayer from God Almighty to protect us from the evil of temptations and the evil of their makers and to spare our countries and societies from their evils.
Were studied some bacteria evidence of pollution as well as the total number of live bacteria in the waters of the Diyala river and selected five stations within the 17 km final Diyala River before its mouth in the Tigris River was the first before the new bridge of the Diyala River about 4 km and the second after the mouth of the water purification plant Rustumiya suit inverselywith temperatures
Comparative literature is one of the important research topics in finding new relations and results that other types of studies do not allow.
The present research is a comparative study between two contemporary poets : Al-Sayyab and Prévert. The reason for accomplishing this research is Al-Sayyab’s reading for the western literature. Moreover, the study sheds a light on translational criticism.
It tackles the lives of the two writers and their points of similarities and differences. Prévert and Al-Sayyab’s are two modern poets. The first employed his daily routines to express reality, specially the events of the two world wars. The second’s pain, on the other hand, was the starting point to express others’ suffe
... Show MoreThe problem of multi assembly line balancing appears as one of the most prominent and complex type of problem. The research problem of this dissertation is concerned with choosing the suitable method that includes the nature of the processes of the multi assembly type of the sewing line at factory no. (7). The State Company for Leather Manufacturing. The sewing line currently suffers from idle times at work stations which resulted in low production levels that do not meet the production plans. The authors have devised a flexible simulation model which uses the uniform distribution to generate task time for each shoe type produced by the factory. The simulation of the multi assembly line was based on assigni
... Show MoreNuclear shell model is adopted to calculate the electric quadrupole moments for some Calcium isotopes 20Ca (N = 21, 23, 25, and 27) in the fp shell. The wave function is generated using a two body effective interaction fpd6 and fp space model. The one body density matrix elements (OBDM) are calculated for these isotopes using the NuShellX@MSU code. The effect of the core-polarizations was taken through the theory microscopic by taking the set of the effective charges. The results for the quadrupole moments by using Bohr-Mottelson (B-M) effective charges are the best. The behavior of the form factors of some Calcium isotopes was studied by using Bohr-Mottelson (B-M) effective charges.
Abstract
Due to the lack of previous statistical study of the behavior of payments, specifically health insurance, which represents the largest proportion of payments in the general insurance companies in Iraq, this study was selected and applied in the Iraqi insurance company.
In order to find the convenient model representing the health insurance payments, we initially detected two probability models by using (Easy Fit) software:
First, a single Lognormal for the whole sample and the other is a Compound Weibull for the two Sub samples (small payments and large payments), and we focused on the compoun
... Show MoreAn optoelectronic flow-through detector for active ingredients determination in pharmaceutical formulations is explained. Two consecutive compact photodetector’s devices operating according to light-emitting diodes-solar cells concept where the LEDs acting as a light source and solar cells for measuring the attenuated light of the incident light at 180˚ have been developed. The turbidimetric detector, fabricated of ten light-emitting diodes and five solar cells only, integrated with a glass flow cell has been easily adapted in flow injection analysis manifold system. For active ingredients determination, the developed detector was successfully utilized for the development and validation of an analytical method for warfarin determination
... Show MoreAn optoelectronic flow-through detector for active ingredients determination in pharmaceutical formulations is explained. Two consecutive compact photodetector’s devices operating according to light-emitting diodes-solar cells concept where the LEDs acting as a light source and solar cells for measuring the attenuated light of the incident light at 180˚ have been developed. The turbidimetric detector, fabricated of ten light-emitting diodes and five solar cells only, integrated with a glass flow cell has been easily adapted in flow injection analysis manifold system. For active ingredients determination, the developed detector was successfully utilized for the development and validation of an analytical method for warfarin determination
... Show MoreThe fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t
This research aims to clarify the importance of an accounting information system that uses artificial intelligence to detect earnings manipulation. The research problem stems from the widespread manipulation of earning in economic entities, especially at the local level, exacerbated by the high financial and administrative corruption rates in Iraq due to fraudulent accounting practices. Since earning manipulation involves intentional fraudulent acts, it is necessary to implement preventive measures to detect and deter such practices. The main hypothesis of the research assumes that an accounting information system based on artificial intelligence cannot effectively detect the manipulation of profits in Iraqi economic entities. The researche
... Show More