Praise be to Allaah.
My research has included the following: The field of application of semantics when fundamentalists are the book and the Sunnah. Imam Ibn Hajar agreed with the majority of fundamentalists that what is meant from the year (one word denotes one side on two things onwards), and agreed that the significance of the year specific to the rest of its members is not a definite and definite formulas of the public has the singular known as (the) Astragharism, and the plural known as ( The nationality stating that dumping, pluralism is defined as (add), and nakra, if it occurs in the context of the condition, denial and prohibition, the names of the condition, the connected names, and the word (all - all). And the year in which the particular is intended.
The current research deals with practical studies that explain to the Iraqi consumer multiple instances about the phenomenon of water hammer which occur in the water pipeline operating with pressure. It concern a practical study of the characteristics of this phenomenon and economically harmful to the consumer the same time. Multiple pipe fittings are used aimed to reduce this phenomenon and its work as alternatives to the manufactured arresters that used to avoid water hammer in the sanitary installations, while the consumer did not have any knowledge as to the non-traded for many reasons, including the water pressure decreases in the networks and the use of consumer pumps to draw water directly from the network. Study found a number of
... Show MoreRecord, verify, and showcase your peer review contributions in a format you can include in job and funding applications (without breaking reviewer anonymity).
One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system,
... Show Moreجاء ابن كثير في عصر نشط فيه التأليف في كل فن من فنون الدراسات الدينية والعربية، ومن الطبيعي أن يكون التأليف في ميدان السيرة النبوية مواكبًا لهذا النشاط الذي استقى مواده ونصوصه من الثروة الضخمة من الكتب والآراء والروايات التي سجلها العلماء والمحدثون والحفاظ قبل ذلك العصر.
The aim of this research is to find out the influence of Daniel's model on the skills of the twenty-first century among the students of the scientific-fifth grade at the secondary and preparatory government morning schools for the academic year 2022- 2023. Two groups were chosen out of five groups for the fifth-scientific grade, one of which represents the experimental group that is taught by the Daniel model, and the other is the control group that is taught in the traditional method. The equivalence of the two research groups was verified with a set of variables. As for the research tool, a scale was developed by the researchers for the skills of the twenty-first century, in which they adopted the framework of the Partnership Organizat
... Show MoreNowadays, cloud computing has attracted the attention of large companies due to its high potential, flexibility, and profitability in providing multi-sources of hardware and software to serve the connected users. Given the scale of modern data centers and the dynamic nature of their resource provisioning, we need effective scheduling techniques to manage these resources while satisfying both the cloud providers and cloud users goals. Task scheduling in cloud computing is considered as NP-hard problem which cannot be easily solved by classical optimization methods. Thus, both heuristic and meta-heuristic techniques have been utilized to provide optimal or near-optimal solutions within an acceptable time frame for such problems. In th
... Show MoreAccurate prediction of river water quality parameters is essential for environmental protection and sustainable agricultural resource management. This study presents a novel framework for estimating potential salinity in river water in arid and semi‐arid regions by integrating a kernel extreme learning machine (KELM) with a boosted salp swarm algorithm based on differential evolution (KELM‐BSSADE). A dataset of 336 samples, including bicarbonate, calcium, pH, total dissolved solids and sodium adsorption ratio, was collected from the Idenak station in Iran and was used for the modelling. Results demonstrated that KELM‐BSSADE outperformed models such as deep random vector funct
The research amid to find out the extent of Iraqi oil companies commitment to implement internal control procedures in accordance with the updated COSO framework. As the research problem was represented in the fact that many of the internal control procedures applied in the Iraqi oil companies are incompatible with most modern international frameworks for internal control, including the integrated COSO framework, issued by the Committee of Sponsoring Organizations of the Tradeway Committee. The research followed the quantitative approach to handling and analysing data by designing a checklist to represent the research tool for collecting data. The study population was represented in the Iraqi oil companies, while the study sample
... Show MoreThis study focuses on studying an oscillation of a second-order delay differential equation. Start work, the equation is introduced here with adequate provisions. All the previous is braced by theorems and examplesthat interpret the applicability and the firmness of the acquired provisions