Preferred Language
Articles
/
jcoeduw-867
المتغیرات الداخلیة والخارجیة المؤثرة على النظام السیاسي في باكستان ٢٠٠٩ - للمدة من ١٩٩
...Show More Authors

The research(the internal and external factors affecting the political system in
PAKISTAN) involves a series of effects interact both internally and external to affect the
stsbility of the political system.
Intrernally there are a lot of powers affecting the political map of PAKISTAN such as
military institution, political parties, judgement, religious schools……etc.of internal
factors, which represent one of the most important pressure points on the system.
Externally one of the most important external factors which affect internal stability is
Pakistani allision to USA in antiterrorism war. The Pakistani military institution was
involved in the war against Pakistani tribes leading to unstable security in Pakistan
,leading to lessen the popularity of Gen.MUSHARAF who ruled Pakistan 1999-
2008.Gen.MUSHARAF took the responsibility of fighting terrorism in cooperation with
USA, this was on of his mistakes during ruling Pakistan which made the Pakistani people
to condemn and was a failure in Pakistani policy .Its the same problems of the political
system during the erra of the president (ASSF ZRDARI). This research is involved with
the major problems of the system in parallel with the continuous war against
AFGHANSTAN which has geographical, racial and religious links with Pakistan. These
problems are putting shadows on the Pakistani society which supports Afghani Taliban
through Pakistani Taliban. They have the same strategic goal to push the Americans out of
the area.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 29 2022
Journal Name
College Of Islamic Sciences
From the flags of The Koofic Grammar: Abdullah Al-Tuaal (243A.H)
...Show More Authors

    This research has tackled a scientific figure belongs to Koofi grammatical school. He is Abdullah Al-Tuaal who has occupied the fourth layer among the Koofi grammarians. There was a confusion between him and another Koofi grammarian from the same layer (Mohammed Bin Qaadim) in some old references. This research has clarified this confusion to affirm that they are two different grammarians.This research also tackles the scientific status of Al-Tuaal and the grammatical views that have been ascribed to him in addition to the analysis and discussion of these views. All this in the light of what has been mentioned in grammar books about the issues in which these views were stated.

View Publication Preview PDF
Publication Date
Sun Sep 30 2012
Journal Name
College Of Islamic Sciences
The fundamentalists' position on the absolute prohibition and its impact          In different jurisprudence
...Show More Authors

Praise be to God, who started his book with the praise of himself and prayers and peace be upon those who have no prophet after him and his family and companions and those who followed them with charity until the Day of Judgment.
     For it is known to every researcher in jurisprudence and its origins that the semantics in terms of formulas for assignment are divided into an order and a prohibition, and I have seen it necessary to write a small research on the prohibition, and since this topic is complex, and has a great impact on the difference of scholars, I decided to write on one issue of it And it is the absolute prohibition and its effect on the difference of jurists, and what is meant by the absolute p

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 01 2009
Journal Name
Journal Of Educational And Psychological Researches
الأساليب التربوية الـمستمدة من السـنـة النـبـوية لـتـصـحـيـح أخطاء المتعـلمـين
...Show More Authors

 تتركز مشكلة البحث في ضعف كثير من المربين معلمين كانوا أو مدرسين في التعامل مع أخطاء المتعلمين في ضوء السنة النبوية مما يؤدي إلى تعلم غير منتظم، ومن أهم أسباب هذه المشكلة قلة الإطلاع على الأساليب العملية التي ينبغي أن يتعامل بها المربي مع أخطاء المتعلمين، ولا سيما الأساليب المستمدة من القرآن الكريم والسنة النبوية، وهذا ما لمسه الباحث واقعاً من خلال ممارسته لعملتي التعليم والتدريس لمدة خمس عشرة سنة، ومن خ

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
Using some Natural Minerals to Remove Cadmium from Polluted Water
...Show More Authors

Water scarcity is one of the most important problems facing humanity in various fields such as economics, industry, agriculture, and tourism. This may push people to use low-quality water like industrial-wastewater. The application of some chemical compounds to get rid of heavy metals such as cadmium is an environmentally harmful approach. It is well-known that heavy metals as cadmium may induce harmful problems when present in water and invade to soil, plants and food chain of a human being. In this case, man will be forced to use the low quality water in irrigation. Application of natural materials instead of chemicals to remove cadmium from polluted water is an environmental friendly approach. Attention was drawn in this research wor

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
A Comparison Between Two Shape Parameters Estimators for (Burr-XII) Distribution
...Show More Authors

This paper deals with defining Burr-XII, and how to obtain its p.d.f., and CDF, since this distribution is one of failure distribution which is compound distribution from two failure models which are Gamma model and weibull model. Some equipment may have many important parts and the probability distributions representing which may be of different types, so found that Burr by its different compound formulas is the best model to be studied, and estimated its parameter to compute the mean time to failure rate. Here Burr-XII rather than other models is consider  because it is used to model a wide variety of phenomena including crop prices, household income, option market price distributions, risk and travel time. It has two shape-parame

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Optimization of nanostructured/nano sized rice husk ash preparation
...Show More Authors

The objective of the study is developing a procedure for production and characterization of rice husk ash (RHA). The effects of rice husk (RH) amount, burning/cooling conditions combined with stirring on producing of RHA with amorphous silica, highest SiO2, lowest loss on ignition (LOI), uniform particle shape distribution and nano structured size have been studied. It is concluded that the best amount is 20 g RH in 125 ml evaporating dish Porcelain with burning for 2 h at temperature 700 °C combined with cooling three times during burning to produce RHA with amorphous silica, SiO2 90.78% and LOI 1.73%. On the other hand, cooling and stirring times affect the variation of nano structured size and particle shape dis

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
مجلة كلية دجلة الجامعة
الاستخدامات والتقنيات الحديثة للمحاسبة القضائية للحد من الفساد المالي
...Show More Authors

ت لا نم ظ او ره لا يأ لاح اهلاح رضاحلا رصعلا يف ةريطخ ه ةوشرلا لثم ةيداصتقا ةميرج ديعصلا ىلع ةيبلس بقاوع اهل يتلاو زازتبلااو لاوملأا لسغو ني ىلا ةجاحلا تءاج انه نم ، يداصتقلااو يعامتجلاا تاسسؤم لبق نم اهينبت يغبني يرادلإاو يلاملا داسفلا نم دحت تامدخو بيلاسأو تاينقت ةيلاملا مئارجلا نم دحلل ةلودلا اع ىلع عقت يتلا تاسسؤملا نمو ةيئاصقتسلاا ةبساحملا وا ةيئاضقلا ةبساحملاب تلثمت ةيداصتقلاا تادحولا يف ينبت اهقت ة

... Show More
View Publication
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
The Psychometric Properties of the Arabic Version of Nomophobia Scale among Omani Youth
...Show More Authors

The current research aimed to investigate the psychometric characteristics of the Arabic version of the Nomophobia scale for the Omani youth. The scale was administered to a random sample of students from public and private universities and colleges in Oman. The research sample consisted of 2507 students, of whom 868 males and 1639 females. The validity of the measure was first checked by presenting the scale to a group of experts in this field. Then the exploratory and confirmatory factor analysis was carried out. The exploratory factor analysis revealed the existence of three main factors: the fear of connectivity loss, the fear of communication loss with others, and the fear of network outages. These factors accounted for 65.6% of the

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
On Faintly θ- Semi-Continuous and Faintly δ-Semi-Continuous Functions
...Show More Authors

      Faintly continuous (FC) functions, entitled faintly S-continuous and faintly δS-continuous functions have been introduced and investigated via a -open and -open sets. Several characterizations and properties of faintly S-continuous and faintly -Continuous functions were obtained. In addition, relationships between faintly s- Continuous and faintly S-continuous function and other forms of FC function were investigated. Also, it is shown that every faintly  S-continuous is weakly S-continuous. The Convers is shown to be satisfied only if the co-domain of the function is almost regular.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref