In this research, the researcher sheds light on the greatness of the horrors (Al-Hashr) enlightened by the Holy Quran, explaining his dangerous details, his horrors, and his frightening changes. -35-36-37
Perhaps the most prominent motivations for the research and its justification is to remind people of the days of God Almighty, and the mention of the insect always pushes the believer to do honorable, and avoid sins, over the days, and prepare for the time of the resurrection, in the hands of knowing a scientist.
In order to identify the subject of entomology and its contents, the researcher based his study on the scientific methodology, it has excavated the origin of the entomology and its meanings, showing the proven and untrue statements, revealing the types of crammed. In addition to distinguishing between the insects and the Baath, the insects and publishing, and the corners of the creatures and non-cornered, and how to physically cramming on the Day of Resurrection and the difference between the speech scientists, is the old body itself or a new body others.
Protection of the oil pipelineswhich extracted from the wells was found to shut the well and prevent the leakage of oil when broken using safety valve. This valve is automatically activated by loss of pressure between the well and pipelines, which take the pressure, signal from hydraulic pressure sensor through pressure control valve which has constant or variable value but it is regulated manually. The manual regulatory process requires the presence of monitoring workers continuously near the wells which are always found in remote areas. In this paper, a smart system has been proposed that work with proportional pressure control valve and also electronic pressure sensor through Arduino controller, which is programmed in a way that satisfie
... Show MoreThis paper includes the synthesis of some new nucleoside analogues starting with 2-substituted benzimidazole derivative (7-9), that synthesized by condensation of O-phenylenediamine with p-chloro benzaldehyde and two substituted benzoic acid , which on nucleophilic substitution with propargyl bromide gave a new N-substituted compounds (10-12). D-Fructose and D-galactose were chosen as a sugar moiety which were protected, brominated and azotated to give azido sugars (5) and (6), then they were subjected to 1,3-dipolar cycloaddition reaction with N-substuted compounds afforded bloked nucleoside analoges (13-16), which after hydrolysis gave our target the free nucleoside analogues (17-20). All prepared compounds were identified by FT-IR
... Show MoreA new series of 5-methoxy-2-mercapto benzimidazole derivatives were synthesized by the reaction of 5-methoxy- 2-mercaptobenzimidazole with chloroacetic acid and affords 2-((5-methoxy-1H-benzo[d]imidazol-2-yl)thio) acetic acid (1),which on cyclization with acetic anhydride and pyridine gives 7- methoxybenzo[4,5]imidazo[2,1-b]thiazol- 3(2H)-one(2), which on condensation with different aryl aldehydes in the presence of anhydrous sodium acetate in glacial acetic acid, furnishes a arylidene thiazolidinone. The purity of the synthesized compounds was confirmed by melting point and TLC.The structures were established by different spectral analysis such as FTIR,1HNMR, and CHN analysis. The newly synthesized compounds (3a-d) were in vivo evaluated f
... Show MoreAlthough allowable amounts of glycol contamination in diesel engine oil, no research has been conducted on how these levels and varying loads affect engine performance. The research used a four-stroke diesel engine to investigate the effect of different glycol contamination levels (0, 120, and 220 ppm) under two engine loads (4.5 and 9 kW). Brake specific fuel consumption, brake thermal efficiency, friction power, and exhaust gas temperature were measured to determine the engine performance. The experiment used the factorial arrangement in a completely randomized design (CRD) with three replicates. Increasing the contamination levels from 0 to 120 and then to 220 ppm under constant engine load significantly increased brake specific fuel con
... Show MoreThe antioxidant and antibacterial activities of ethanolic extract and phenolic compounds extract of Lemon balm (Melissa officinalis) and Oregano (Oreganum vulgare) plants were studied; the phenolic content and the relationship between these compounds and the above activities were also investigated. The results showed that the Lemon balm had the highest phenolic content (56.5% mg g) and the phenolic content of Oregano was twice lower than Lemon balm. Lemon balm has the highest antioxidant activity which causes lipid peroxidation inhibition activity of linoleic acid (90.5%), this activity was more than ?-tocopherole antioxidant activity (79.3 %). It was found that the main source of antioxidant activity o
... Show MoreAn experimental study was carried out to improve the surface roughness quality of the stainless steel 420 using magnetic abrasive finishing method (MAF). Four independent operation parameters were studied (working gap, coil current, feed rate, and table stroke), and their effects on the MAF process were introduced. A rotating coil electromagnet was designed and implemented to use with plane surfaces. The magnetic abrasive powder used was formed from 33%Fe and 67% Quartz of (250µm mesh size). The lubricant type SAE 20W was used as a binder for the powder contents. Taguchi method was used for designing the experiments and the optimal values of the selected parameters were found. An empirical equation representing the r
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More