Fortieth book is IbnAssaker mechanisms of modern books authored attention appeared amenable to the Messenger of Allah's will (Fife da upon h-d) in his emotional tempting scientists say despite his weakness and preached it save forty Hadith of year necessitated intercession and entering heaven eh Fife FA scientists 1940s h.g. Gae updated combines forty Hadith on a particular topic, authored destinations differed and collected and compiled, the first item in the 1940s that Abdul Rahman Abdullah ibn al-mubaarakmarvzishaikAssaker promised more than thirty workbook in this kind of composition topics varied between consolidation and conversations prove the Almighty Barry qualities, conversations provisions, worship, preaching, and of them only in writing to correct sind conversations when modern imams, and some of them mention high conversations attribution, and some of them mention long conversations. ShaikAssaker, who was rated at this type it is a forty forty sleepless in alawal replacement in due diligence in establishing the imposition of Jihad as well as 40 countries studied, which disclosed save capacity came through the trip's widespread, Whitlam shaikAssaker in writing mentioned forty Hadith about forty fortyforty city elder companion in 40 subject with interest in graduate study, as well as talks and isnaad is very weak book of geographical and historical magazine. And can no longer write who wrote funny layers if we take into account his interest in a specific layer they ageing layer and layer with companions he didn't translate to the companions or full translation ageing because this place somewhere else. As well as in his novel about ageing in various countries of the benefits of knowing the imams of the novel in the 16th century Hijri, and knowing their sheikhs and to h any shaikAssaker on some women and some sentimental but also recounted on ageing posed very little for him and for his.
Silver-bismuth iodide (ABI) ternary semiconductors, such as AgBi2I7, AgBiI4, Ag2BiI5, and Ag3BiI6, have emerged as promising lead-free light absorbers for photovoltaic applications due to their favorable optoelectronic properties. Despite recent advances that have improved power conversion efficiencies from ∼1% to over 5%, ABI-based solar cells still show substantial open-circuit voltage (VOC) losses of up to ∼1 V, which significantly hinder the device performance. These losses have been experimentally attributed to the non-radiative recombination originating from intrinsic defects, however, theoretical understanding of these defect mechanisms remains limited. Here, using density functional theory calculations, we systematical
... Show MoreThis study aimed to develop a stable nanosuspension of repaglinide and improve its dissolution, using the Nano-precipitation method, involving a different concentration of a stabilizer, different co-stabilizers and different solvents. Employment of a systemic approach to optimize the formulation parameters, including stabilizer concentration, solvent choice and co-stabilizer election. Soluplus® (SOL) was used as the primary stabilizer for this research, polyvinyl alcohol (PVA), poloxamer 188 (PXM 188), tween 80 (TW80), and polyvinyl pyrrolidine (PVP k30) were investigated as co-stabilizers to prevent particle agglomeration and ensure long-term stability. In addition to ethanol as a primary solvent, acetone and chloroform were used
... Show MoreMicrobial water disinfection with UV rays is a universal technology. Disinfection is a method used to treat drinking water. This can be accomplished using physical and/or chemical processes. Physical Methods: Heating and UV rays are two main methods - UV rays to destroy cells and kill bacteria. The physical process generally gives drinking water an instant purification without producing harmful substances. However, there is no pollution in the water to ensure continuous cleaning. This study’s primary goal is to obtain environmentally safe drinking water in situations of water shortages and homes that lack clean water. Therefore, resort to appropriate home treatment. Therefore, an ex
Graph is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree are determined.
Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different
... Show MoreIn light of accelerating environmental degradation, the transition to a green economy is an imperative for achieving sustainable development. This study provides a critical analysis of the international legal and institutional framework governing this transition, revealing a significant gap between normative developments and the institutional framework on one hand, and their practical implementation on the other. The transition faces legal obstacles, including reliance on non-binding voluntary commitments and conflicts between environmental obligations and global trade and investment rules. It also reveals a significant financing gap, as financial flows to developing countries continue to lag behind commitments, in add
... Show MoreBroyden update is one of the one-rank updates which solves the unconstrained optimization problem but this update does not guarantee the positive definite and the symmetric property of Hessian matrix.
In this paper the guarantee of positive definite and symmetric property for the Hessian matrix will be established by updating the vector which represents the difference between the next gradient and the current gradient of the objective function assumed to be twice continuous and differentiable .Numerical results are reported to compare the proposed method with the Broyden method under standard problems.
In this paper, a computational method for solving optimal problem is presented, using indirect method (spectral methodtechnique) which is based on Boubaker polynomial. By this method the state and the adjoint variables are approximated by Boubaker polynomial with unknown coefficients, thus an optimal control problem is transformed to algebraic equations which can be solved easily, and then the numerical value of the performance index is obtained. Also the operational matrices of differentiation and integration have been deduced for the same polynomial to help solving the problems easier. A numerical example was given to show the applicability and efficiency of the method. Some characteristics of this polynomial which can be used for solvin
... Show MoreKE Sharquie, AA Khorsheed, AA Al-Nuaimy, Saudi Medical Journal, 2007 - Cited by 91