Preferred Language
Articles
/
jcoeduw-1184
The Referential Aspect of the Quranic Text Az-Zahraa’s)Peace Be Upon Her( Speech
...Show More Authors

In the present paper, the researcher attempts to shed some light on the objective behind inserting some Qur'anic verses by Al-Zahraa (Peace Be Upon Her) in her revered speech. Besides, it tries to investigate the hidden meaning of these verses and to study them in the light of pragmaticreferences. This task is supported by Books of Tafseer as well as the books that explained this speech to arrive at its intended meaning. It is possible say that this is astep towards studying speeches of 'Ahlul Bayt' (People of the Prophet's household) in terms of modern linguistic studies, as well as employing modern methods to explore the aesthetic values of these texts.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Nov 12 2018
Journal Name
Arab Science Heritage Journal
اثر أثر مزارات الأئمة الأطهار (ع) في أسلوب الفنان العراقي سلمان عباس ( دراسة تحليلية
...Show More Authors

 God Almighty singled out Arab nation to carry divine messages، and make them the land of Iraq to store the soil prophets and apostles and grandchildren of Al al-Bayt، peace be upon them as they were and are still a beacon for people،  Shrines and monuments and flags، frequented by science students from various walks of life، were are shrines representing the name of Iraq by the private and the nation of Islam in general، sung by the preacher and artist and writer

View Publication Preview PDF
Publication Date
Sat Jul 18 2020
Journal Name
College Of Islamic Sciences
التيارات الثقافية في العصر العباسي ودور اهل البيت (ع) في مواجهتها (الامام الحسن العسكري انموذجا
...Show More Authors

In mid 3rd century H . and exactly in the second Abbasid  era, Thereappeared ideological trends which are skeptical of Islamic religion depending upon the magic at one time , and Telmudi ideas at other times . The Muslim scholars , headed by Imam Al – Hasan Al – Askari , answerd them by Iogic and scientific arguments , relying on the gloroious  Qur an and the prophetic Sunnah ,and what He learnt from his grandparents . Therefore , He managed to take down their ideas in the bud and rescue the Islamic religion from anything irrelevant to what the prophet brought .

View Publication Preview PDF
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
The Degree of Focus of The Science Curriculum for the First Intermediate Grade on National, Health, Environmental And Economic Values in Light of the Education Policy in The Kingdom of Saudi Arabia and a Suggested Scenario for a Mechanism to Be Strengthe
...Show More Authors

The study aimed to reveal the extent of the first intermediate grade science curriculum focus on the national values, health, environmental, economic values, in the light of the education policy in the Kingdom of Saudi Arabia, in addition to present a proposed vision to strengthen it in the science curriculum for the first intermediate grade. The study was applied to the two books student and the two books of activity on the first-second semesters for the academic year 1441 AH. To analyze the curriculum content, the study used a verified card prepared by the researchers and a criterion for interpreting percentages. The study reached the following results: environmental values ranked first with a concentration of (43%), i.e. with an avera

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 17 2021
Journal Name
Arab Science Heritage Journal
النص بين فعلي الكتابة و القراءة
...Show More Authors

         If the text has a writer, then he also has a reader who is multiple in his readings, interpretations and understanding of the text, in addition to that he is still in contradiction to researchers in what is the ideal reader o

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Effect of Preservatives Upon Sensory Properties of Laboratory Biscuit During Storage
...Show More Authors

The study was conducted to detect the effect of addition of 0.03, 0.06 and0.10% potassium sorbate and 0.10, 0.15, 0.20 and 0.30% sodium propionate upon the sensory properties of laboratory made biscuit. The statistical analysis of the results revealed no significant differences (P<0.05) between the propionate treatment (A,B,C,D) and between the sorbate treatment (E,F,G) and the control (H) in most sensory properties of biscuit prior to storage. Upon six month storage of biscuit made with addition of different levels of sodium propionate 20-40C (room temperature) no significant differences (P<0.05) were shown on softness, flakiness and color in comparison with the control . No significant differences (P<0.05) were also

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 12 2017
Journal Name
Journal Of Engineering
Influence of Temperature Upon Permanent Deformation Parameters of Asphalt Concrete Mixes
...Show More Authors

        The performance of asphalt concrete pavement has affected by many factors, the temperature is the most important environmental one which has a large effect on the structural behavior of flexible pavement materials. The main cause of premature failure of pavement is the rutting, Due to the viscoelastic nature of the asphalt cement, rutting is more pronounced in hot climate areas because the viscosity of the asphalt binder which is
inversely related to rutting is significantly reduced with the increase in temperature resulting in a more rut susceptible paving mixtures. The objective of this study is to determine the effect of temperatures variations on the permanent deformation parameters (perm

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding text in gray image using mapping technique
...Show More Authors

Publication Date
Sat Nov 02 2019
Journal Name
Advances In Intelligent Systems And Computing
Spin-Image Descriptors for Text-Independent Speaker Recognition
...Show More Authors

Building a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More