Preferred Language
Articles
/
bsj-4423
A Theoretical Investigation on Chemical Bonding of the Bridged Hydride Triruthenium Cluster: [Ru3 (μ-H)( μ3-κ2-Hamphox-N,N)(CO)9]
...Show More Authors

Ruthenium-Ruthenium and Ruthenium–ligand interactions in the triruthenium "[Ru3(μ-H)(μ3-κ2-Hamphox-N,N)(CO)9]" cluster are studied at DFT level of theory. The topological indices are evaluated in term of QTAIM (quantum theory of atoms in molecule). The computed topological parameters are in agreement with related transition metal complexes documented in the research papers. The QTAIM analysis of the bridged core part, i.e., Ru3H, analysis shows that there is no bond path and bond critical point (chemical bonding) between Ru(2) and Ru(3). Nevertheless, a non-negligible delocalization index for this non-bonding interaction is calculated. The interaction in the core Ru3H can be described as a (4centre–4electron) type. For Ru-N (oxazoline ring) bond, the calculated topological data propose a pure σ-bond. The computed topological parameters of oxazoline ligand reveal the presence of slightly some double bond characters within ligand ring.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
A book in the science of rhyme for the father of conquest Othman bin Jinni ‹v 392 e›: Investigation and study
...Show More Authors

This book in our hands is a 'book in the science of rhymes' written by the linguistic and grammatical world 'Othman bin Jenni' 'T 392 AH', and included in it: the concept of rhyme, its characters, movements, and disadvantages, with mention of its ramifications, defining them by definition, clarification and martyrdom poetry, It is concise in size, but it is a book containing a full science in its content.
The study was divided into two parts, the first: the study, and included a study of the author and the author, I talked first about his life, such as his name and origin, and scientific status, and the words of scientists in it, and so on, and secondly: the name of the book, and his percentage, and the time of its composition, etc. I

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
College Of Islamic Sciences
What the linguists commented on, "I do not know" in the dictionary of Lisan al-Arab, a semantic study
...Show More Authors

Absitract

This research was interested in studying the phrase “I don’t know” in the Lisan al-Arab dictionary, and Lisan al-Arab was based on collecting its material from five dictionaries, including: Tahdhib al-Lugha, al-Muqamah, al-Sahih, and the footnotes of Ibn Berri, al-Nihaya and Gharib al-Hadith. The objection to this phrase, and the discussion of its various implications among linguists and the clarification of the closest and most famous content to it according to the data presented to the researcher in his research journey, and to reach this goal, the research division into a preface, five demands and a conclusion and followed the list of sources and references. To define the lexicon of Lisan al-Ar

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
Schema Theory and Text- worlds: A Cognitive Stylistic Analysis of Selected Literary Texts
...Show More Authors

Cognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections.       

Schema and text world theories are useful tools in cognitive stylistic stud

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sun Apr 06 2014
Journal Name
Journal Of Educational And Psychological Researches
الفكــر التـــربـــوي عنـــد ابو يوسف يعقوب بن اسحق الكنــــدي ( دراسة نظرية )
...Show More Authors

Every era characterizes with its thought and life philosophy , where Muslims left behind them educational and intellectual heritage we should proud of it because it reflects the image of past and lights the way of present and future path where we should make use of it to fit with our statuesque and contemporary issues because we don’t know about it but little as result of ignorance or imitation of the western culture.

      It’s wrong to regard heritage from the past but aphasia of Islamic and Arab genies that its roots tracing back to past and extending to future .

      Islamic Arab educational thought regards one of the ric

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 01 2024
Journal Name
مجلة بحوث الشرق الاوسط
نظرية التعددية الثقافية في الفكر السياسي لـ ويل كيمليكا: دراسة نقدية
...Show More Authors

التعددية الثقافية هي مفهوم يتعلق بالمجتمعات التي تضم ثقافات عده، أو العالم الذي يتضمن ثقافات متنوعة؛ فالتعددية هي التنوع الثقافي والفكري؛ وبالتالي هي عنصر إثراء للإنسانية وأساس لوجودها؛ فالتعددية الثقافية تتضمن القبول بالثقافات والافكار الانسانية كلها، وإفساح المجال أمامها للمشاركة في بنا ء الثقافة والفكر العالمي؛ وهكذا فإنها تتمثل في التسامح مع الثقافات والافكار المختلفة الاعتراف بالهويات والخصوصيات

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 14 2020
Journal Name
International Journal Of Psychosocial Rehabilitation
Factor study of some BioKinematic variables of the step of crossing barriers (3-6-9) in the 110m run barriers for young runners
...Show More Authors

<em>The aim of the research is to set a set of BioKinematic variables for the step of crossing barriers (3–6–9) in a 110-meter barrier for young runners. The researchers concluded the study by interpreting and discussing the results that the most important variables must be relied upon when training and selecting runners that got the best saturation on their factors: 1-The first factor which refers to the total distance of the plan to pass the third barrier + the total distance of the plan to pass the ninth barrier + the total distance Plan to cross the sixth barrier. 2-The second factor which refers to the total vertical speed before passing the third barrier + the total vertical speed before the sixth barrier + the total vertica

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Post a reflection on the capabilities of personnel programs A prospective study of a sample of the views of the staff at the Ministry of Higher Education and Scientific Research
...Show More Authors

            This research aims to know the role and impact of participation in the capabilities of human resources programs, and for the purpose of measuring it has been determined the dimensions of these two variables by relying on standards for this purpose, was chosen as the Ministry of Higher Education and Scientific Research / device supervision and scientific calendar as one of the important departments in the ministry and includes a large number of individuals at different organizational levels for the purpose of answering a questionnaire prepared for the purpose of measurement and access to the results and the achievement of the objectives of the research and which ha

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 05 2022
Journal Name
Heat Transfer
Numerical investigation of natural convection in a square enclosure partially filled with horizontal layers of a porous medium
...Show More Authors
Abstract<p>Two‐dimensional buoyancy‐induced flow and heat transfer inside a square enclosure partially occupied by copper metallic foam subjected to a symmetric side cooling and constant heat flux bottom heating was tested numerically. Finite Element Method was employed to solve the governing partial differential equations of the flow field and the Local Thermal Equilibrium model was used for the energy equation. The system boundaries were defined as lower heated wall by constant heat flux, cooled lateral walls, and insulated top wall. The three parameters elected to conduct the study are heater length (7 ≤ <italic>ζ</italic> ≤ 20 cm), constant heat flux (150 ≤ <italic>q<</italic></p> ... Show More
View Publication
Scopus (6)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Tue Dec 06 2022
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of an Interventional Program on Nurses Practices regarding Removing and Cleaning Burn Dead Tissue
...Show More Authors

Abstract

Objective(s): The study aims to measure the effectiveness of the program on removing dead tissue for burn patients by testing the nurses before the program in addition to testing them again after implementing the educational program.

Methodology: The study is quantitative in nature (one experimental) and will employ pre- and post-testing techniques between October 17, 2020 and March 20, 2022. A non-probability (purposive) sample of 24 nurses working in the Azadi Teaching Hospital's Burns and Plastic Surgery Center was chosen. The experimental survey of nursing practice, a literature review, scientific records, and previous research were all taken into considerat

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
An Empirical Investigation on Snort NIDS versus Supervised Machine Learning Classifiers
...Show More Authors

With the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t

... Show More
View Publication Preview PDF
Crossref (5)
Crossref