Arab heritage have teem much of the literature value, written by evacuated, who had a legacy of linguistic great scientists, but the circumstances are unknown, did not write those books or authors emerge, chose to search for a book of those compositions, he did not write to him and his book emerge, fell hands a book (Altvsh in the language) to Abu Sufyan grammar, a fourth-century scientists, as it is Abu Sufyan grammar of scientists who rolled up the time their impact, and the cryptic revelations among the stars, preferring to stand on this book and its author, a statement of the most important grammatical aspects contained therein; to notch the curtain for this world, and his book (Altvsh in strewn language and Mnzawmha and express the Koran witness so her) a title mentioned by the author on the first page of the manuscript, which shortened investigator book, Dr. Adil Hadi al-Obeidi, who branded (b Altvsh in the language), as it is this book of the most important books of Abu Sufyan, which reached us, the book launch phenomena grammatical and linguistic multi made him an important reference of linguistic references that pervaded the knowledge and science of language, was not revenue Abi Sufyan to those phenomena it is arbitrary, but rather was the result of they understand this world Galilee matters of language and arts . Were the most important reasons that led to this study:1- The lack of knowledge of the book and its author, as is this book of rare books, who has never for a recognition or the author, so I suggested that the derived importance of research of the scarcity of writers and unavailability, to be a search as evidence of this book and its author, and the source for those who wanted to know something from them.
2- The Abu Sufyan as of the fourth century scientists who did not write them prominence, Vartoat in this research highlight it; to be a new source of that century scientists who had provided the language Bnteghm scientific sober, and stand on his views grammatical, and find out their compatibility and disagreement with the views of scientists.
Due to the large number of grammatical opinions contained in the book of Abu Sufyan, I thought I might be selected to study some of the views in which grammatical, as well as giving a brief biography of the author of the book.
Many numerical approaches have been suggested to solve nonlinear problems. In this paper, we suggest a new two-step iterative method for solving nonlinear equations. This iterative method has cubic convergence. Several numerical examples to illustrate the efficiency of this method by Comparison with other similar methods is given.
Purpose: The concept of complete street is one of the modern trends concerned with diversifying means of transportation and reducing the disadvantages of mechanical transportation modes. This paper discusses the role of complete streets can play in developing the urban environment in the Alyarmok District of Baghdad. Method/design/approach: The linear regression method used to analyze the opinions of 100 respondents surveyed in the study area in order to find the relationship between the urban environment and the complete street elements. Theoretical framework: The Modern trends in urban planning aim to find alternatives to the policies of traditional transportation planning that focus on vehicular mobi
... Show MoreIn this paper, we consider a new approach to solve type of partial differential equation by using coupled Laplace transformation with decomposition method to find the exact solution for non–linear non–homogenous equation with initial conditions. The reliability for suggested approach illustrated by solving model equations such as second order linear and nonlinear Klein–Gordon equation. The application results show the efficiency and ability for suggested approach.
Freedom of opinion is one of the freedoms that constitutions and laws have guaranteed to protect and is exercised through the media. However, this freedom must be exercised within certain limits, which include respecting a person’s right to preserve his privacy, image and reputation. Just as the media has the freedom to exercise its right to publish and express its opinion with complete frankness, it is in return obligated to respect the rights of others and avoid defaming them and violating their privacy. If the media does this, the injured party has the right to demand compensation for the damage he has suffered as a result.
The present work describes guggul as a novel carrier for some anti-inflammatory drugs. Guggulusomes containing different concentration of guggul with aceclofenac were prepared by sonication method and characterized for vesicle shape, size, size-distribution, pH, viscosity, spread ability, homogeneity, and accelerated stability in-vitro drug permeation through mouse skin. The vesicles exhibited an entrapment efficiency of 93.2 ± 12%, vesicle size of 0.769 ± 3μm and a zeta potential of - 6.21mV. In vitro drug release was analyzed using Franz’s diffusion cells. The cumulative release of the guggulusomes gel (G2) was 75.8% in 18 hrs, which is greater than that all the gel formulation. The stability profile of prepare
... Show MoreAlloys of GaxSb1-x system with different Ga concentration (x=0.4, 0.5, 0.6) have been prepared in evacuated quartz tubes. The structure of the alloys were examined by X-ray diffraction analysis (XRD) and found to be polycrystalline of zincblend structure with strong crystalline orientation (220). Thin films of GaxSb1-x system of about 1.0 μm thickness have been deposited by flash evaporation method on glass substrate at 473K substrate temperature (Ts) and under pressure 10-6 mbar. This study concentrated on the effect of Ga concentration (x) on some physical properties of GaxSb1-x thin films such as structural and optical properties. The structure of prepared films for various values of x was polycrystalline. The X-ray diffraction analy
... Show MoreFading channel modeling is generally defined as the variation of the attenuation of a signal with various variables. Time, geographical position, and radio frequency which is included. Fading is often modeled as a random process. Thus, a fading channel is a communication channel that experiences fading. In this paper, the proposed system presents a new design and simulate a wireless channel using Rayleigh channels. Rayleigh channels using two approaches (flat and frequency-selective fading channels) in order to calculate some path space loss efforts and analysis the performance of different wireless fading channel modeling. The results show that the bite error rate (BER) performance is dramatically improved in the value of signal to
... Show MoreInternet of Things (IoT) is a recent technology paradigm that creates a global network of machines and devices that are capable of communicating with each other. Security cameras, sensors, vehicles, buildings, and software are examples of devices that can exchange data between each other. IoT is recognized as one of the most important areas of future technologies and is gaining vast recognition in a wide range of applications and fields related to smart homes and cities, military, education, hospitals, homeland security systems, transportation and autonomous connected cars, agriculture, intelligent shopping systems, and other modern technologies. This book explores the most important IoT automated and smart applications to help the reader u
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show More
