Preferred Language
Articles
/
jcois-1142
The grammatical approach to explain Bant Souad's poem (Explanation of Ibn Hisham as a model) a . M . Dr. Abdul Hamid Hamad shehatha Mustansiriya University Faculty of Basic Education the department of Arabic language
...Show More Authors

 

This study is concerned with shedding light on the grammatical method of Ibn Hisham Al-Ansari (761 AH), in his explanation of Bant Souad’s poem by the poet Kaab bin Zuhair, and I included a brief description of Ibn Hisham’s life with a number of explanations of this poem, then clarified the most important features of this method The grammar represented by his reliance on hearing and presenting it to analogy with mention of types of analogy, as well as his attribution of opinions to their owners with weighting, selection and balancing, and his attention to reasoning and a number of grammatical ailments, and his approach is also distinguished by following the method of fractal.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Huazhong University Of Science And Technology [medical Sciences]
New mini dental implant attachments versus O-ring attachment after cyclic aging: Analysis of retention strength and gap space
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Fri Sep 01 2017
Journal Name
International Journal Of Science And Research (ijsr)
Effect of Lepidium sativum Aqueous Crude Extract in Some Fertility Parameters in Mice, IJSR, Call for Papers, Online Journal
...Show More Authors

The uses of traditional plant extract in the treatment of various diseases have been flourished. The present study, IJSR, Call for Papers, Online Journal

View Publication
Publication Date
Sun Jan 01 2017
Journal Name
Aip Conference Proceedings
Macro controlling of copper oxide deposition processes and spray mode by using home-made fully computerized spray pyrolysis system
...Show More Authors

View Publication
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Sep 20 2023
Journal Name
Journal Of Applied And Natural Science
Detection of some virulence genes (esp, agg, gelE, CylA) in Enterococcus faecalis isolated from different clinical cases at Baghdad
...Show More Authors

The virulent genes are the key players in the ability of the bacterium to cause disease. The products of such genes that facilitate the successful colonization and survival of the bacterium in or cause damage to the host are pathogenicity determinants. This study aimed to investigate the prevalence of virulence factors (esp, agg, gelE, CylA) in E. faecalis isolated from diverse human clinical collected in Iraqi patient , as well as to assess their ability to form biofilm and to determine their haemolytic and gelatinase activities. Thirty-two isolates of bacteria Enterococcus faecalis were obtained, including 15 isolates (46.87%) of the urine, 6 isolates (18.75%) for each of the stool and uterine secretions, and 5 isolates (15.62%) of the wo

... Show More
Preview PDF
Publication Date
Thu Jul 11 2024
Journal Name
الموئتمخر الدولي للعلم والتعليم
SUFFIXAL METHOD FOR FORMING NEW VOCABULARY IN RUSSIAN AND ARARBIAN LANGUAGES AND ITS INFLUENCE ON ACHIEVEMENT OF TRANSLATION ADEQUACY
...Show More Authors

Abstract. In this scientific work, we investigate the problem of the practical necessity of achieving the adequacy of translation activities with active translation from Russian into Arabic in various fields of translation. Based on the material of the latest suffix vocabulary, a serious attempt is made to clarify and specify the rules for the development of translator's intuition when translating from Russian into Arabic and vice versa. Based on the material collected by the latest suffix vocabulary, we try to make an attempt to reveal the role of suffix word creation in highlighting the general rules for achieving translation equivalence. The paper examines the process of creating words in multi-family languages, the difference between th

... Show More
Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Best Multiplier Approximation of Unbounded Periodic Functions in L_(p,∅_n ) (B),B=[0,2π] Using Discrete Linear Positive Operators
...Show More Authors

The purpose of this paper is to find the best multiplier approximation of unbounded functions in    –space by using some discrete linear positive operators. Also we will estimate the degree of the best multiplier approximation in term of modulus of continuity and the averaged modulus.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Jul 15 2021
Journal Name
University Of Samarra
Preparation, Diagnosis and Biological ‎Efficacy of new Ligands Derived from ‎Succinyl Chloride and Their Metal ‎Complexes and non metallic
...Show More Authors

The purpose of my thesis is to synthesis two new bidentate ligands ‎which were used to prepare series of metal complexes by reacting the ‎ligands with (M+2 = Mn, Co, Ni, Cu, Cd and Hg) ‎ ‎ Succinyl chloride was used as starting material to synthesis two ‎bidentate ligands (L1) and (L2) by reaction it with 4-chloroaniline ‎‎(L1) and ‎ ‎ (4-aminoacetophenone) (L2) in dichloromethane as a solvent, that ‎are:‎ ‎(L1) = N1,N4-bis (4-chloro phenyl ) succinamide ‎(L2) =N1,N4-bis(4-acetylphenyl)succinamide ‎ The new ligands were characterize by using spectroscopic study ‎‎(Fourier-transform infrared spectroscopy (FT-IR), electronic spectra ( ‎UV-Vis) ,nuclear magnetic resonance(1H,13C-NMR), Mass spectra ‎

... Show More
Publication Date
Mon Feb 18 2019
Journal Name
Iraqi Journal Of Physics
Measurement of radon and uranium concentration in soil samples from Babylon cement plant using nuclear track detector CR-39
...Show More Authors

In this study, concentrations of radon and uranium were measured for twenty six samples of soil. The radon concentrations in soil samples measured by registrant alpha-emitting radon (222Rn) by using CR-39 track detector. The uranium concentrations in soil samples measured by using registrar fission fragments tracks in CR-39 track detector that caused by the bombardment of U with thermal neutrons from 241 Am-Be neutron source that has flux of 5 ×103n cm-2 s-1.
The concentrations values were calculated by a comparison with standard samples The results show that the radon concentrations are between (91.931-30.645Bq/m3).
The results show that also the uranium concentrat

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Mon Aug 30 2021
Journal Name
Al-kindy College Medical Journal
Practice and Opinion of Doctors in Primary Health Care Centers Toward Referral System: Samples from Nine Governorates in Iraq
...Show More Authors

Background: Most primary Health Care Centers (PHCCs) in Iraq have a referral system records; however, this mechanism does not function well because of the lack of other requirements for an efficient referral system.

Objective: To assess the practice & opinion of doctors in PHCs toward the referral system, and to determine the doctors in PHC's commitment to referral system instructions and guidelines.

Subjects and methods: A cross-sectional study with analytic elements was conducted in nine health directorates in Iraq, from the 1st October 2018 – 30th June 2019.One PHC was selected randomly form each sector in every governorate, A questionnaire was used to collect the required information.

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (17)
Crossref (6)
Scopus Crossref