Preferred Language
Articles
/
GhehCY4BVTCNdQwC5zAj
Strengthening AL-Kadhimin Tilted Minaret by Using a System of Micro-piles
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Semantic (Badi'iyah)Readings in The Prophetic Praise Poetry (Mada'h Nabawiya) (Abdel Rahim Bin Ahmad Bin Ali Al Borai as a case study)
...Show More Authors

The importance of this topic may not be overlooked by many of the specialists, because it is one the sciences of the Arabic language, but it is an important method in the field of influencing the recipient and his aesthetic ability to create influential images as well.
The talking about Semantic (Badi'iyah)is as old as the Arabic age, so it may be talking about it not the new thing because the people who specialized have preceded us and exhausted all the talk .

View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The Moral Scale In Poetry Selections Al-Ihata Book: The Moral Scale In Poetry Selections Al-Ihata Book
...Show More Authors

Abstract:
Ibn al-Khatib valuable Mokhtarath poetry as a moral standard that writer
committed to the conscious function of art, and believing that the place
literature is determined standards of literary and alone is a (complete criticism
from a moral stance) was adopted by the evidence of a professional image
analogy and metaphor, and metaphor and the antagonism of the expression
of all ideas put forward is consistent with the internal rhythm arts Bdieip
consistent with the method Bhawwarith and clarity of language structure and
carried Petrakebha multiple form of expressionism. Ghani, who contrast
abstraction and its proximity to the Forum staff readily near the sensory data,
and the religious impact of the

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 30 2016
Journal Name
College Of Islamic Sciences
Ibn Al Anbari grammatical inferences On   Abu Hatim al-Sijistani through his book Clarify the stay and start
...Show More Authors

Ibn al-Anbari, however, turned to Abu Hatim al-Sijistani in eleven places of his book ((clarify the endowment and start)). The study showed that the right and right was with the son of Anbari and that what went to Sistani saying uniqueness, and contrary to the vast majority of scientists. The study also showed that the science of grammar affects the endowment and initiation, as the study showed that the science of endowment and initiation is one of the important sciences of the Koran, which must be carefully received, researchers.

View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Iraqi Journal Of Science
Applications of Camera Total Station System (CTSS) in the Construction Surveying
...Show More Authors

AZ Khalaf, M kassim Haidir, LK Jasim, Iraqi Journal of Science, 2012

View Publication
Publication Date
Sun Jul 30 2023
Journal Name
Iraqi Journal Of Science
Liouvillian and Darboux First Integrals of the Self-Assembling Micelle System
...Show More Authors

     In this paper we prove that the planar self-assembling micelle system

 has no Liouvillian, polynomial and Darboux first integrals. Moreover, we show that the system

has only one irreducible Darboux polynomial  with the cofactor being   if and only if  via  the weight homogeneous polynomials and  only two irreducible exponential factors  and  with  cofactors    and   respectively with be the unique Darbox invariant of system.

View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jun 30 2015
Journal Name
Al-kindy College Medical Journal
Organizational and behavioral determinants of health information system performance in Iraq
...Show More Authors

Background: Health information systems in most countries are inadequate in providing the needed management support and the current health information systems are therefore widely seen as management obstacles rather than as tools,Objectives: the current study is an attempt to assess the behavioral and organizational determinants of health information system performance in Iraq.Methods: A cross-sectional study was conducted by interviewed a total of 189 respondents selected from six Iraqi governorates. The Organizational and Behavioral Assessment Tool was used to measure the behavioral and organizational determinants of health information system performance, it is one of the PRISM package tools that are used to assess the health informatio

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Iraqi Journal Of Physics
Studying Audio Capacity as Carrier of Secret Images in Steganographic System
...Show More Authors

Steganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other.  In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Developing System of Solid Waste Management (Applied Research in Hilla City)
...Show More Authors

Abstract

The research aims to stand on the practice of operations management of solid waste in the city of Hilla, carried out by the mayor of Hilla Directorate - solid and the environment Waste Division, through field visits and personal interview to officials of the municipal departments and units of its data collection and information related to solid waste, and assess the current status of the processes of collection and transport waste through the questionnaire that had been prepared for citizens and employees, the search reach a set of conclusions was the most important, operations carried out by the municipality of Hilla Directorate only limited to two (collection, transportation and disposal of wa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Al-kindy College Medical Journal
Practice & Opinion of Doctors in Hospitals toward Referral System in Iraq
...Show More Authors

Background: Primary Health care (PHC) is unanimous to be the cornerstone of a person-centered health system. While the adoption of a well-function, two-way, and organized referral system is the mainstay in the development of an efficient healthcare delivery system.  

Objective: To Assess the practice & opinion of doctors in the hospitals toward the referral system.  to determine the doctors in the hospital's commitment to referral system instructions and guidelines.

Subjects and Methods: A cross-sectional study with analytic elements was conducted in nine Iraqi governorates. Eight doctors from each health directorate, resulting in a tot

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Mar 06 2016
Journal Name
Baghdad Science Journal
The Impact of Operating System on Bandwidth in Open VPN Technology
...Show More Authors

The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will

... Show More
View Publication Preview PDF
Crossref