Preferred Language
Articles
/
jcoeduw-1264
الاعتراضاتُ النحويَّة لابنِ خروف(ت609هـ) على ابنِ طاهر (ت 580هـ)
...Show More Authors

إنَّ من أجلِّ العلومِ علوم العربيَّة , إذْ هيَ المَرقاة إلى فهمِ كتابِ الله , وقد بذلَ سلفُنا الصالح في هذا المجال جهودًا مضنية , وقفوا من خلالِها على أسرارِ الكثيرِ من لطائفِ هذه اللغةِ الشريفة, وتركوا لنا تراثًا ضخمًا أودعوه دقائقَ فكرهِم وعميقَ نظرهِم وهو عنوان لحضارة ِهذه الأمة وأمجادها .

   أمَّا ابنُ خروف فهو من أشهر نحاة الأندلس في القرن السادس والسابع الهجريين , ومن أشهرِ شُرَّاح كتاب سيبويه , نجدُ آراءَهُ النحويَّة مبثوثةً في كتب النحوالمتأخرة  ؛وذلك لما ينمازُ به من ذهنٍ وقّادٍ وعقليةٍ خصبة , رَبَطتْهُ بأستاذهِ أبي بكر بنِ طاهر علاقة وطيدة أشبهُ ما تكون بعلاقةِ الخليلِ(ت 175هـ) بسيبويه(ت180هـ) ، ويطفحُ شرحُهُ لكتابِ سيبويه الموسومِ بــ (تنقيح الألباب في شرح غوامض الكتاب) بتقديره وإجلالهِ لأستاذهِ ابنِ طاهر الذي نعتهُ بـ (الأُستاذ ) في أكثر المواضع, وكثيرًا ما تَرَحَّمَ عليه عند ذكرِه إياه, وقد أقرُّ لهُ بالفضل وبأنِّ جميعَ حسناتهِ في شرحِ الكتابِ آيلة إليه.  قالَ ابنُ خروف مادحًا أُستاذه: (( وللأستاذ أبي بكر في كتاب الأبنية عجائب من تبيين مشكلها وتحقيق المستدرك منها ,وشرح الألفاظ المجهولة فيها, وتعليل ما لم يصح استدراكه والتنبيه عليه, وغير ذلك مما انفرد به (رحمه الله ), واجتمع في هذا الكتاب من ذلك العَجب العُجاب , وما أَظنك يانحويُّ تجده مجموعًا ملخصًا هذا الجمع والتلخيص في كتابٍ , فجميع حسناتي فيه منه (رحمه الله) .

View Publication
Publication Date
Fri Dec 15 2017
Journal Name
Journal Of The College Of Education For Women
Identity in Sonia Sanchez's Poem "right on: white america" :A Stylistic Study
...Show More Authors

Language is an important means through which one can construct one's social world. Accordingly, the way we view ourselves and the world is basically formed by language use whereby identities, relations, and values are constructed and maintained. Most discourse analysts consider narrative not only the locus of construction and enactment of identity, but also a distinguished genre for its analysis.The present study is concerned with how identity can poetically be informed, hence exploring the way black poets use language when reflecting their identity and culture. The poem, right on: white america by the black American poetess Sonia Sanchez, is chosen to be analyzed based on Simpson's stylistic model (2004). In this model, the ana

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Improving Nursing process Performance based on service scheduling dimensions. ( Field research)
...Show More Authors

Abstract :

This present paper sheds the light on dimensions of scheduling the service that includes( the easiness of performing the service, willingness , health factors, psychological sides, family matters ,diminishing the time of waiting that improve  performance of nursing process including ( the willingness of performance, the ability to perform  the performance , opportunity of performance) . There is genuine problem in the Iraqi hospitals  lying into the weakness of nursing staffs , no central decision to define and organize schedules. Thus the researcher has chosen  this problem as to be his  title . The research come a to develop  the nursing service

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 15 2021
Journal Name
Al-academy
The aesthetic work of theatrical rehearsal and its directing applications "Taqasim on Al-Hayat Play as a model"
...Show More Authors

This research reviews the aesthetic variables that were founded according to (theatrical rehearsal) as one of the most important pillars on which the theatrical process is based, because of its necessity in developing theatrical art on several levels that helped the theatrical director in organizing his work, and this became clear through the research chapters represented in the first chapter (methodological framework) and the second chapter, which consisted of the first topic (the duality of watching / rehearsal) and the second topic (the applications of theatrical rehearsal in theatrical experiences), all the way to the third chapter (research procedures), which included the analysis of theatrical rehearsals (sharing on life), and the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 05 2012
Journal Name
مجلة القادسية للعلوم
Effect of some environmental factors on the tolerance of Bacillus subtilis to heavy metals
...Show More Authors

Abstract Twelve isolates of bacteria were obtained from samples of different soils and water amended with 100µg/ml of five heavy metals chlorides (i.e: Aluminum Al+2, Iron Fe+2, Lead Pb+2, Mercury Hg+2 and Zinc Zn+2). Four isolates were identified as Bacillus subtilis and B. subtilis (B2) isolate was selected for this study according to their resistance to all five heavy metals chlorides. The ability of B. subtilis (B2) isolate for growing in different concentration of heavy metals chlorides ranging from 200-1200 µg/ml was tested. The highest conc. that B. subtilis (B2) isolate tolerate was 1000 µg/ml for Al+2, Fe+2, Pb+2, and Zn+2and 300 µg/ml for Hg+2 for 24hour. The effect of heavy metals chlorides on bacterial growth for 72 hrs was

... Show More
Publication Date
Sun Oct 02 2016
Journal Name
Journal Of Educational And Psychological Researches
تحليل محتوى كتاب الرياضيات للصف الاول المتوسط على وفق مكونات المعرفة
...Show More Authors

هدفت الدراسة الى تحليل محتوى كتاب الرياضيات للصف الاول متوسط على وفق مكونات المعرفة الرياضية (المفاهيم الرياضية , التعميمات الرياضية, المهارات الرياضية والمسائل الرياضية )

وتفرعت منه الاسئلة الاتية :

مانسبة المفاهيم الرياضية المتضمنة في كل فصل من فصول كتاب الرياضيات للصف الاول متوسط  وللكتاب ككل ؟

مانسبة المهارات الرياضية المتضمنة في كل فص

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 09 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Impact Cloud Computing On The Development of Accounting Education: Evidence From Sultanate of Oman
...Show More Authors

Cloud computing is the new technological trend for future generations. It represents a new way to use IT resources more efficiently. Cloud computing is one of the most technological models for developing and exploiting infrastructure resources in the world. Under the cloud, the user no longer needs to look for major financing to purchase infrastructure equipment as companies, especially small and medium-sized ones, can get the equipment as a service, rather than buying it as a product. The idea of ​​cloud computing dates back to the sixties of the last century, but this idea did not come into actual application until the beginning of the third millennium, at the hands of technology companies such as Apple, Hp, IBM, which had

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Wed Jan 02 2019
Journal Name
Journal Of Educational And Psychological Researches
Evaluation Tasks of Performance Quality of the University Students According to the Developmental Environment
...Show More Authors

 Education is a process of learning and education at the same time. As the conditions of modern life necessitate every person to keep learning, education has become a necessity to meet life needs. The society today is concerned with the educational process and aims to live up the expectations. Since education is an integral part of education and its means, it has become as a mean to achieve its purposes. The educational environment was a traditional environment limited to specific inputs, possibilities and stimulus of both teacher and student. Due to the latest advancement, the educational environment has been expanded to become a rich, with strong connections. It has expanded to encompass the entire global environment. The current

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 01 2022
Journal Name
Iraqi Journal Of Physics
Effect of Carbon Nanoparticles on the Performance Efficiency of a Solar Water Heater
...Show More Authors

Carbon nanoparticles are prepared by sonication using carbon black powder. The surface morphology of carbon black (CB) and carbon nanoparticles (CNPs) is investigated using scanning electron microscopy (SEM). The particles size ranges from 100 nm to 400 nm for CB and from 10 nm to 100 nm for CNPs. CNPs and CB are mixed with silicon glue of different ratios of 0.025, 0.2, 0.05, and 0.1 to synthesis films. The optical properties of the prepared films are investigated through reflectance and absorbance analyses. The ratio of 0.05 for CNPs and CB is the best for solar paint because of its higher solar water heater efficiency and is then added to the silicon glue . Temperature of cold water and temperature of hot water in storage tank were ta

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Hiding the Type of Skin Texture in Mice based on Fuzzy Clustering Technique
...Show More Authors

A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref