Preferred Language
Articles
/
EhfIdo4BVTCNdQwCLknz
نصوصٌ مسما ریةٌ غیرُ منشورةٍ من عصر أور الثالثة تتع لّق بالحیوانات
...Show More Authors

تعرضت المواقع الاثریة في الع ا رق الى النبش والتخریب،وقد أدى ذلك الى أستخ ا رج أعداداً كبیرة من النصوص المسماریة وتهریبها الى خارج الع ا رق. ومن ضمنها نصوص مدینة أ ري- ساكرك، فقد درست مجموعة من هذه النصوص والبالغ عددها ( ١١٥٩ ) نصاً التي نش رت في في هذا البحث قمنا بد ا رسة ( ٤) نصوص مصادرة لصالح المتحف .(Nisaba مجلد ( 15 الع ا رقي ذات مضامین أقتصادیة تتعلق بالحیوانات،ارخت بین السنة الثانیة والاربعین من حكم الملك شولكي وحتى السنة الثانیة من حكم الملك أبي سین، تعود النصوص الى مدینة اریساكرك .(Iri-sag̃rigki)

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 03 2016
Journal Name
Journal Of Educational And Psychological Researches
Measure the fear of some natural phenomena among children Riyadh
...Show More Authors

One of the most frightening to children ages pre-school entry , Are those concerns about natural phenomena such as (The darkness, the sound of thunder, lightning and light, and rainfall, and storms) These natural phenomena are not familiar to the child , It may have a surprise when he/ she sees , And others intimidated , The affects of panic and fears that may lead him some psychological injury symptoms.

The fear of the dark, of the most common concerns associated with the child in his daily life , As the children's fear of the dark is reasonably fear that makes him a natural to live in the unknown  , We can not identify what around him and is afraid of something collision,  Or injury from somet

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
تَنویرُ الذَّاتِ بالمنتَخبَاتِ من مَسائِل النحوِ في سُورةِ المرسَلاتِ
...Show More Authors

That grammatical studies, a phenomenon of the Arabic language,
enabling the researcher during his research of the development of sentences,
textual analysis, to be the result of that meaning semantic of a sentence, and
the statement of the function the individual, in terms of its meaning in
context, and a link to the meaning lexical give indications of the current
single, and correlation analysis II , in terms of significance with the current
status syntactic to that individual, and these of the most important features of
grammatical studies of modern, based on the relationship structure sense, and
the relationship of the meaning of the structure, we looked for Aiklo for such
a study, Koran, all meanings and co

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
On Faintly θ- Semi-Continuous and Faintly δ-Semi-Continuous Functions
...Show More Authors

      Faintly continuous (FC) functions, entitled faintly S-continuous and faintly δS-continuous functions have been introduced and investigated via a -open and -open sets. Several characterizations and properties of faintly S-continuous and faintly -Continuous functions were obtained. In addition, relationships between faintly s- Continuous and faintly S-continuous function and other forms of FC function were investigated. Also, it is shown that every faintly  S-continuous is weakly S-continuous. The Convers is shown to be satisfied only if the co-domain of the function is almost regular.

View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Modified Weighted Pareto Distribution Type I (MWPDTI)
...Show More Authors

In this paper, the Azzallini’s method used to find a weighted distribution derived from the standard Pareto distribution of type I (SPDTI) by inserting the shape parameter (θ) resulting from the above method to cover the period (0, 1] which was neglected by the standard distribution. Thus, the proposed distribution is a modification to the Pareto distribution of the first type, where the probability of the random variable lies within the period  The properties of the modified weighted Pareto distribution of the type I (MWPDTI) as the probability density function ,cumulative distribution function, Reliability function , Moment and  the hazard function are found. The behaviour of probability density function for MWPDTI distrib

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Mar 30 2021
Journal Name
College Of Islamic Sciences
Taking Over The Judiciary By Women And The Position Of Law From That: مثالا
...Show More Authors

لمقدمة

     الحمد لله رب العالمين والصلاة والسلام على سيد الأنبياء والمرسلين نبينا محمد صلى الله عليه وسلم وعلى  واصحابه أجمعين  ومن تبعهم وأهتدى بهداهم الى يوم الدين اما بعد :

        فوظيفة القضاء وظيفة سامية يراد منها اقامة العدل ولا يستقيم حالهم الا به دفعاّ للظلم ، ولقد اولى النبي صلى الله عليه وآله وسلم ومن بعده الخلفاء الراشدون

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
T-Essentially Coretractable and Weakly T-Essentially Coretractable Modules
...Show More Authors

        A new generalizations of coretractable modules are introduced where a module  is called t-essentially (weakly t-essentially) coretractable if for all proper submodule  of , there exists f End( ), f( )=0 and Imf tes  (Im f + tes ). Some basic properties are studied and many relationships between these classes and other related one are presented.

View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Wed Apr 01 2009
Journal Name
Journal Of Educational And Psychological Researches
واقع خدمة الانترنت من وجهة نظر المستفيدين( دراسة تحليلية)
...Show More Authors

 على الرغم من تحقق ثورة هائلة وطفرة نوعية في مجال تكنلوجيا الاتصالات في دول العالم الا ان بلدنا كان محروما من التمتع بهذه التقنيات الحديثة في ظل النظام السابق, وبعد سقوط النظام ووجود بحبوحة من الحرية، دخلت الكثير من هذه التقنيات الى العراق ومنها الموبايل والانترنيت وغيرها من وسائل الاتصال المتطورة.

ويقول (Smith & Fletcher, 2001) في كتابهما Inside Information

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
The Position of the United States from Britain in the discussions of British Evacuation from Egypt (1946-1952)
...Show More Authors

Many reasons combined behind the Standing of U.S. against Britain in its aggression against Egypt in 1956; the consensus of world opinion on the need to stop the aggression and the fear of the Soviet military intervention which mean a new world war.
United States desired to weaken British influences in the region in general to get new oil gains in the Arabian Gulf and Egypt at the expense of Britain. The exiting of Britain from the area served U.S. strategic interests in the Middle East in general and Egypt in particular to keep the flow of oil for U.S advantage.
The United States wanted to keep its image in the region to apply its future political projects including Eisenhower Project, which intended to take the position of Britis

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2016
Journal Name
Al–bahith Al–a'alami
From Structure to the Signal (Text and Discourse in the Semiotic Analysis)
...Show More Authors

Care and attention to the structure in the sixties of the last century replaced the mark, and if the structure of Ms. pampered in research and studies, it has become the mark is also a spoiled lady .. But the relationship between the structure and the mark was not a break and break, but the relationship of integration, His themes are structural analysis, and these are intellectual themes that can not be surpassed in contemporary research, especially since semiotics have emerged from the linguistic inflection.

We have tried to distinguish between text and speech, which is a daunting task, as it seems that whenever the difference between them is clear and clear, we come back to wonder whether the text is the same discourse, and is

... Show More
View Publication Preview PDF