Preferred Language
Articles
/
jcoeduw-1511
An Estimated Answer of a Condition between the Interpretive Structure and Surface Structure: Al-Qurtubi’s Tafseer as a Model: عمر عقلة خليف الدعجة
...Show More Authors

This present work is concerned with one of the syntactic issues that has been researched by many linguists, grammarians, and specialists in Islamic studies, the estimated answer to a condition. However, this topic is researched this time by examining Imam Al-Qurtbi’s opinions in interpreting related ayas from the holly Quraan in his book (Collector of Quranic Rules) or its transliteration (Al-Jami’ Li Ahkam Al-Quran). Such a step involves commenting on, tracking what Al-Qurtbi said in this regard, discussing it from the points of view of other grammarians, and judging  it accordingly, taking into account the apparent surface structures of the examples collected. To achieve this objective, the inductive analytical approach has been adopted in the analysis by tracing Al-Qurtbi’s various views in interpreting the Quranic verses. One of the most important conclusions of this study is that Al-Qurtubi was a carful interpreter of such linguistic issues, as his analysis was characterized by being highly intellectual and mature. Concerning the estimation of the answer to a condition, the study has concluded that Al-Qurtubi was concerned with the applied aspect of the concepts of interpretive and superficial structures, specifically when he estimated the answer to a condition in each presented verse.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
The relation between the governmental consumption expenditure and the economic growth in Iraq for the period 1981-2006
...Show More Authors

ABSTRACT

        The research aim is to determine the relation between governmental consumption expenditure (GCE) & GDP in Iraq for the period 1981-2006.

The research has determined the scale of optimization for (GCE) & try to know the extent productivity of this expenditure and using the long run &short run model to test .The results clarify the following

1-The marginal productivity for the (GCE) is positive so it is productive.

2-The (GCE) in Iraq is too high because the marginal productivity for the expenditure less than 1.

3- The (GCE) percentage to GNP is

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 06 2022
Journal Name
Al–bahith Al–a'alami
THE ETHICAL RESPONSIBILITY OF THE COMMUNICATOR IN PRESS INSTITUTIONS TO CONSOLIDATE THE VALUES OF TOLERANCE: A Study of the Communicator in the Newspapers (Al-Zaman, Al-Sabah, Al-Mada) For the period: 1/5/2020 to 1/10/2020
...Show More Authors

This research deals with the role that the media can play in spreading awareness, culture and sound behavior among members of society, due to its ability to reach the largest number of individuals; its wide spread within society; and the moral responsibility of the media in consolidating the components of civil peace. The media works on forming intellectual convictions and behavioral attitudes by publishing opinions and ideas, introducing them to people's awareness and enhancing them in the practice of their daily lives, he was its media medium. Sociologists and psychologists confirm that the media. The significance of the research comes due to the broadening of violence and sectarian fighting; the absence of a culture of civil social pe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (14)
Crossref (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Engineering
Toward Improving BIM Acceptance in FM: A Conceptual Model Integrating TTF and TAM
...Show More Authors

Substantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovat

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Sep 30 2017
Journal Name
College Of Islamic Sciences
Ruling on questioning children by the security authorities: (Comparative Study between Sharia and Law)
...Show More Authors

Some of the issues that have become common in our society recently after the Americans entered our country and were rubbed by some security agencies: obtaining some information from children, and the serious consequences that may lead to the lives of innocent people, became common interrogation of some security agencies and rely on their words.
There are significant cases where their testimony needs to be heard, such as their presence in some places where incidents are not witnessed by others, such as schools or being witnesses to certain crimes.
I saw the study of this case in the light of Sharia and law

View Publication Preview PDF
Publication Date
Thu Mar 02 2023
Journal Name
8th Engineering And 2nd International Conference For College Of Engineering – University Of Baghdad: Coec8-2021 Proceedings
Using WO3/AlPO4 as a solid catalyst for the transesterification of waste edible oils
...Show More Authors

AlPO4 catalysts supported with WO3 were prepared by impregnating the catalysts with ammonium metatungstate. The catalysts were checked by X-ray Diffraction (XRD), AFM, and SEM; also, the catalysts analysis was done by X-Ray (EDX). Finally, the N2 adsorption-desorption was used to measure the pore volume and surface area of the catalyst. The prepared catalyst has a surface area of 185.83 m2/g, pore volume of 0.645 cm3/g at a calcination temperature of 500°C for 3 hrs, and particle size of AlPO4 with an average of 35.36 nm. Transesterification of edible oil using WO3/AlPO4 was performed, it was observed that WO3/AlPO4 catalysts give high conversion of edible oil, and this is attributed to the high surface area, smaller particle size, and the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 03 2024
Journal Name
International Journal Of Economics And Finance Studies
THE IMPACT OF ARTIFICIAL INTELLIGENCE ON ACCOUNTING PERFORMANCE: SUSTAINABLE DEVELOPMENT AS A MEDIATING VARIABLE
...Show More Authors

The UN plans to achieve several development objectives by 2030. These objectives address global warming, a major issue. This method aims to improve sustainable accounting performance (AP). In this circumstance, AI is being applied in various fields, notably in economic, social, and environmental (ESE) domains. This research investigates how sustainable development (SD) influences AI methodologies and AP improvement. The research examined a sample of Iraqi banks listed on the Iraq Stock Exchange from 2014 to 2022. AI was measured by ATM and POS prevalence. A three-dimensional approach examined economic, social, and environmental (ESE) sustainability. Meanwhile, the performance of sustainable accounting was measured through the return on asse

... Show More
Preview PDF
Scopus
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
The Effective M3Y Residual Interaction In 41Ca As a Nuclear Diffraction Grating of Electrons
...Show More Authors

The total and individual multipole moments of  magnetic electron scattering form factors in 41Ca  have been investigated using a widely successful model which is the nuclear shell model configurations keeping in mind of 1f7/2 subshell as an L-S shell and Millinar, Baymann, Zamick as L-S shell (F7MBZ) to give the model space  wave vector. Also, harmonic oscillator wave functions have been used as wave function of a single particle in 1f7/2  shell. Nucleus 40Ca as core closed and Core polarization effects have been used as a corrective with first order correction concept to basic computation of L-S shell and the excitement energy has been implemented with 2ћω. The

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Clarivate Crossref