One of the rules concerning the control of civil transactions is the rule of no harm and harm, which was enacted by our Holy Prophet Muhammad (peace be upon him and his family). Scholars singled it out by research and investigation, and classified by non-scientists independent messages, showing the status of al-Qaeda in terms of its perception, meaning, branches and results, and the importance of this rule in the payment of damage and compensation for it has been provided by the Iraqi legislator generous within the provisions of Iraqi law in all its branches of public and private, as applied The judiciary Iraq The provisions of this rule have been issued and numerous decisions have been made to compensate for the damage and to give to ev
... Show MoreNo-fine concrete (NFC) is cellular concrete and it’s light weight concrete produced with the exclusion of sand from the concrete. This study includes the mechanical properties of lightweight reinforced by steel fiber, containing different proportions of steel fiber. This study was done using number of tests. These tests were density, compressive strength, flexural strength and absorption. These tests of the molds at different curing time. The results of tests that implication of fiber to No. fine concrete did not affect significantly on the compressive strength, While the flexural strength were gets better. Results explained that, the flexural strength of (1%) fiber No- fine concrete molds are four times that of the reference mold
... Show MoreThe problem motivation of this work deals with how to control the network overhead and reduce the network latency that may cause many unwanted loops resulting from using standard routing. This work proposes three different wireless routing protocols which they are originally using some advantages for famous wireless ad-hoc routing protocols such as dynamic source routing (DSR), optimized link state routing (OLSR), destination sequenced distance vector (DSDV) and zone routing protocol (ZRP). The first proposed routing protocol is presented an enhanced destination sequenced distance vector (E-DSDV) routing protocol, while the second proposed routing protocol is designed based on using the advantages of DSDV and ZRP and we named it as
... Show MoreSTAG3 is the meiotic component of cohesin and a member of the Cancer Testis Antigen (CTA) family. This gene has been found to be overexpressed in many types of cancer, and recently, its variants have been implicated in other disorders and many human diseases. Therefore, this study aimed to analyze the major variants of STAG3. Western blot (WB) and immunoprecipitation (IP) assays were performed using two different anti-STAG3 antibodies that targeted the relevant protein in MCF-7, T-47D, MDA-MB-468, and MDA-MB-231 breast cancer cells with Jurkat and MCF-10A cells as positive and negative controls, respectively. In silico analyses were searched to study the major isoforms. WB and IP assays revealed two abundant polypeptides < 191 kDa and
... Show MoreThe basic skills (defensive & offensive) in basketball it is a base for completion and decide the level of the team and the rank, in same time considers the axel of the researchers when putting tests and forming new groups so close from real situation games to create real vision and estimate for skill state and a method to recorrect & presenting positive resolutions, the problem of research were indicate to variables may happen in training operation it demand tests matches with these variables and forming new standards, and another way the researchers find a few patterns for measuring basic skills (defensive & offensive) also application these tests on samples it differs from the originals one that the tests designed for it. The sample repr
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreThe performance of a diesel engine was tested with diesel oil contaminated with glycol at the engineering workshop/Department of Agricultural Machines and Equipment / College of the Agricultural Engineering Sciences at the University of Baghdad. To investigate the impact of different concentrations of glycol on the performance of a diesel engine, an experimental water-cooled four-stroke motor was utilized, with oil containing 0, 100, and 200 parts per million (ppm). Specific fuel consumption, thermal efficiency, friction power, and exhaust gas temperature were examined as performance indicators. To compare the significance of the treatments, the study employed a full randomization des