Preferred Language
Articles
/
jcoeduw-367
Educational values in the Quran: Surat Luqman and AL- Hujurat model
...Show More Authors

The paper has been summarized into the following:
Chapter one: the researcher deals with the problem of the paper, the most important points and the terminology. Chapter two: the researcher deals Surat Luqman from the Aya 12-19 , (the demonstration, the explanations, the values ). In chapter three the researcher deals with Surat AL-Hujurat from Aya 6-12, (the demonstration, the explanations, the values ). Chapter four include (the educational properties for individual and society, the educational applications, and the most important indicators in the texts). Chapter five include the results , the conclusions and the recommendations. One of the basic results that the Quran is a complete educational curriculum, and the texts of Surat Luqman and Surat AL-Hujurat includes global connected educational values, and both implies the same results. The conclusions are: the ways and methods of teaching the Quran is not worthy and the holy Quran do not used as educational curriculum. In the recommendations: it is better to change the ways and the methods of teaching the Quran and take technical teaching methods, make the holy Quran educational curriculum in all stages of learning and educations.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 04 2010
Journal Name
Journal Of Educational And Psychological Researches
guidance program Structured to address therapeutic cognitive emotional disorders (Anxiety and depression model)
...Show More Authors

           Is one of the processes of educational guidance to help the individual to design educational plans that fit with the abilities and inclinations and goals.
And research aims the current instruction program heuristic therapeutic knowledge to deal with emotional disorders. And may the researcher instruct a program according to the theories of interested and competent guidance to education and has studied the large number of studies available in this field, as has been the program on a number of specialists in education and Psychology and took their views. And then was adopted the final version of the indicative program, consistent with the sample, which was built

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 03 2018
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Condition assessment and rehabilitation for trunk sewer deterioration based on Semi-Markov model
...Show More Authors

An accurate assessment of the pipes’ conditions is required for effective management of the trunk sewers. In this paper the semi-Markov model was developed and tested using the sewer dataset from the Zublin trunk sewer in Baghdad, Iraq, in order to evaluate the future performance of the sewer. For the development of this model the cumulative waiting time distribution of sewers was used in each condition that was derived directly from the sewer condition class and age data. Results showed that the semi-Markov model was inconsistent with the data by adopting ( 2 test) and also, showed that the error in prediction is due to lack of data on the sewer waiting times at each condition state which can be solved by using successive conditi

... Show More
Publication Date
Thu Jul 17 2025
Journal Name
Misan Journal Of Academic Studies
Some of Parametric and Non Parametric Estimations for Circular Regression Model via Simulation
...Show More Authors

Circular data (circular sightings) are periodic data and are measured on the unit's circle by radian or grades. They are fundamentally different from those linear data compatible with the mathematical representation of the usual linear regression model due to their cyclical nature. Circular data originate in a wide variety of fields of scientific, medical, economic and social life. One of the most important statistical methods that represents this data, and there are several methods of estimating angular regression, including teachers and non-educationalists, so the letter included the use of three models of angular regression, two of which are teaching models and one of which is a model of educators. ) (DM) (MLE) and circular shrinkage mod

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 28 2019
Journal Name
Journal Of Mechanics Of Continua And Mathematical Sciences
Heuristic Initialization And Similarity Integration Based Model for Improving Extractive Multi-Document Summarization
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Tue Feb 27 2024
Journal Name
Mathematical Modelling Of Engineering Problems
Dynamics of a Fractional-Order Prey-Predator Model with Fear Effect and Harvesting
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Sun Nov 15 2020
Journal Name
Journal Of Petroleum Research And Studies
Reservoir Model and Production Strategy of Mishrif Reservoir-Nasryia Oil Field Southern Iraq
...Show More Authors

Nasryia oil field is located about 38 Km to the north-west of Nasryia city. The field was discovered in 1975 after doing seismic by Iraqi national oil company. Mishrif formation is a carbonate rock (Limestone and Dolomite) and its thickness reach to 170m. The main reservoir is the lower Mishrif (MB) layer which has medium permeability (3.5-100) md and good porosity (10-25) %. Form well logging interpretation, it has been confirmed the rock type of Mishrif formation as carbonate rock. A ten meter shale layer is separating the MA from MB layer. Environmental corrections had been applied on well logs to use the corrected one in the analysis. The combination of Neutron-Density porosity has been chosen for interpretation as it is c

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Semi parametric Estimators for Quantile Model via LASSO and SCAD with Missing Data
...Show More Authors

In this study, we made a comparison between LASSO & SCAD methods, which are two special methods for dealing with models in partial quantile regression. (Nadaraya & Watson Kernel) was used to estimate the non-parametric part ;in addition, the rule of thumb method was used to estimate the smoothing bandwidth (h). Penalty methods proved to be efficient in estimating the regression coefficients, but the SCAD method according to the mean squared error criterion (MSE) was the best after estimating the missing data using the mean imputation method

View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref