This research shows the issues of Ibn Hisham's illusion in its leadership of the grammarians; As Ibn Hisham attributed - during his presentation of grammatical issues - grammatical opinions to a number of grammarians claiming them in them, and after referring to the main concepts that pertain to those grammarians, we found that Ibn Hisham had delusional in those allegations, in addition to that clarifying the terms illusion and claim in the two circles of language And the terminology, and perhaps the most prominent result in this research is that he worked to investigate these issues by referring to their original sources, with an explanation of the illusions of Ibn Hisham in his attribution to these issues.
Dye-sensitized solar cells (DSSC) create imitation photosynthesis by using chemical reactions to produce electricity from sunlight. DSSC has been pursued in numerous studies due to its capability to achieve efficiencies of up to 15% with artificial photosensitizer in diffuse light. However, artificial photosensitizers present a limitation because of the complex processing of metal compound. Therefore, various types of sensitizers were developed and synthesized to surpass the artificial sensitizer performances such as natural sensitizers from bio-based materials including plants, due to simple processing techniques and low environmental impact. Thus, this study examines the potential and properties of natural sensitizers from the was
... Show MoreThis work discusses the beginning of fractional calculus and how the Sumudu and Elzaki transforms are applied to fractional derivatives. This approach combines a double Sumudu-Elzaki transform strategy to discover analytic solutions to space-time fractional partial differential equations in Mittag-Leffler functions subject to initial and boundary conditions. Where this method gets closer and closer to the correct answer, and the technique's efficacy is demonstrated using numerical examples performed with Matlab R2015a.
A series of new 4-(((4-(5-(Aryl)-1,3,4-oxadiazol-2-yl)benzyl)oxy)methyl)-2,6-dimethoxy phenol (6a-i) were synthesized from cyclization of 4-(((4-hydroxy-3,5-dimethoxy benzyl)oxy)methyl)benzohydrazide with substituted carboxylic acid in the presences of phosphorusoxy chloride.The resulting compounds were characterized by IR, 1H-NMR, 13C-NMR, and HRMS data. 2,2-Diphenyl-1-picrylhydrazide (DPPH) and ferric reducing antioxidant power (FRAP) assays were used to screen their antioxidant properties. Compounds 6i and 6h exhibited significant antioxidant ability in both assay. Furthermore, type of substituent and their position of the aryl attached 1,3,4-oxadiazole ring at position five are play an important roles in enhancing or declining the antio
... Show MoreBackground: Oncogenesis in the oral cavity is widely believed to result from cumulative genetic alterations that cause a transformation of the mucosa from normal to dysplastic to invasive carcinoma. The p16 gene produces p16 protein, which in turn inhibits phosphorylation of retinoblastoma (Rb), p16 play a significant role in early carcinogenesis. A number of epidermal growth factor receptor (EGFR) family, HER2/neu, has received much attention because of its therapeutic implications. The aims of the study were to evaluate and compare the immunohistochemical expression of the cell cycle protein P16 INK4a and c-erbB2 (HER2/neu) in NOM, OED, and OSCC. Correlate both marker expression with each other as well as with various clinicopathological
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreIntroduction: Infection control or hospital-acquired infections are the major concern of the health care system and agencies. Critical care nurses are on the first-line contact with the patients, so on, they are most vulnerable to acquired infections. It is really important to regularly check their knowledge and practices concerning infection control. Objectives: The study aims to identify the impact of years’ experience on nurses’ knowledge and practices concerning infection control in three hospitals and center (Baghdad teaching hospital, Ibn Al-Nafees hospital, and Ibn al-Bitar center) Methodology: Cross-sectional study was conducted, the study starting from 4th of July 2020 to 13th of November 2020. Non-probability (purposive) sampl
... Show MoreBuilding numerical reservoir simulation model with a view to model actual case requires enormous amount of data and information. Such modeling and simulation processes normally require lengthy time and different sets of field data and experimental tests that are usually very expensive. In addition, the availability, quality and accessibility of all necessary data are very limited, especially for the green field. The degree of complexities of such modelling increases significantly especially in the case of heterogeneous nature typically inherited in unconventional reservoirs. In this perspective, this study focuses on exploring the possibility of simplifying the numerical simulation pr