Abu Al-Ala Al-Ma’arri is a linguist and writer who showed his prowess in poetry, so he had poetry collections, including “The ulna fell,” which is one of the books that attracted the attention of scholars such as (Tabrizi, Al-Khwarizmi, Al-Bateliusi and Al-Zamakhshari) .
To explain his language in it, the investigators’ hands finally revealed an explanation of this book, which was the work of Abu Al-Ala Al-Ma’arri himself. Those who studied the Divan (The Zind) and its explanations or the character and language of Al-Ma’arri did not pay any attention to it. Therefore, I made this research a continuation of those efforts, using semantic research as a means of revealing Al-Maarri's ef
... Show MoreIn this study, an improved process was proposed for the synthesis of structure-controlled Cu2O nanoparticles, using a simplified wet chemical method at room temperature. A chemical solution route was established to synthesize Cu2O crystals with various sizes and morphologies. The structure, morphology, and optical properties of Cu2O nanoparticles were analyzed by X-ray diffraction, SEM (scanning electron microscope), and UV-Vis spectroscopy. By adjusting the aqueous mixture solutions of NaOH and NH2OH•HCl, the synthesis of Cu2O crystals with different morphology and size could be realized. Strangely, it was found that the change in the ratio of de-ionized water and NaOH aqueous solution led to the synthesis of Cu2O crystals of differen
... Show MoreThis research aims at identifying the level of Moral Awareness and the level of Authoritarian Parenting Style of Secondary School Students in Baghdad. Additionally, the study seeks to identify the significant difference between these two variables in term of gender (male-female), as well as the correlation between Moral Awareness and Authoritarian Parenting Style. To do this, the researchers have adopted the scale of moral awareness prepared by the (Assl 2014), which the number of its items was finalized of (28) items. As for the Authoritarian Parenting Style scale, the researcher designed a questionnaire of (22) items as the number of its finalized form. The two instruments were applied on a sample of (140) male and female Students who
... Show MoreThe financial statements must accurately, clearly and fairly present the financial situation and financial statements should be reliable as well. Pursuant to Board Decision No. (74) 2020, CBI obliges banks, according to the Banking Law No. (94) for the year 2004, Article (33) paragraph 2 concerning real estate owned from previous years and expropriated as a result debt settlement , to apply a real estate liquidation provision at a rate of 20% for each property expropriated and at a rate of 100% for each year of delay up to (5) years .also from the significance of the issue of real estates that become a property of banks as a result of debt settlement and the pr
... Show MoreThe research attempts to diagnose the level of the effect of human resources flexibility (employees skills flexibility, employees behaviors flexibility, and human resource practice flexibility) in the south al-rusafa directorate of a power station one of the formations and the Ministry of Electricity, and impact of a range of variables related to the performance operational, namely, (efficiency, effectiveness)recognizing the importance of the subjects studied,& because of the importance of expected results of the field under consideration,researcher selected a sample of size (121) engineers and technicians of workers in the directorate. Was my hypotheses the major search of a relationship and impact between human resources flex
... Show MoreThe effect of air injection angle on the performance of airlift pump used for water pumping has been studied analytically and experimentally. An airlift pump of dimensions 42mm diameter and 2200 mm length with conventional and modified air injection device was considered. A modification on conventional injection device (normal air-jacket type) was carried out by changing injection angle from 90 (for conventional) to 45 and 22.5 (for modified). Continuity and one-dimensional momentum balance for the flow field with basic principle of two-phase flow and expressions of slip ratio and friction factor as function of flow rates were formulated. The analytical and experimental investigations were carried out f
... Show MoreError control schemes became a necessity in network-on-chip (NoC) to improve reliability as the on-chip interconnect errors increase with the continuous shrinking of geometry. Accordingly, many researchers are trying to present multi-bit error correction coding schemes that perform a high error correction capability with the simplest design possible to minimize area and power consumption. A recent work, Multi-bit Error Correcting Coding with Reduced Link Bandwidth (MECCRLB), showed a huge reduction in area and power consumption compared to a well-known scheme, namely, Hamming product code (HPC) with Type-II HARQ. Moreover, the authors showed that the proposed scheme can correct 11 random errors which is considered a high
... Show MoreOpenStreetMap (OSM) represents the most common example of online volunteered mapping applications. Most of these platforms are open source spatial data collected by non-experts volunteers using different data collection methods. OSM project aims to provide a free digital map for all the world. The heterogeneity in data collection methods made OSM project databases accuracy is unreliable and must be dealt with caution for any engineering application. This study aims to assess the horizontal positional accuracy of three spatial data sources are OSM road network database, high-resolution Satellite Image (SI), and high-resolution Aerial Photo (AP) of Baghdad city with respect to an analogue formal road network dataset obtain
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More