Preferred Language
Articles
/
jcois-1351
Methodology of the Holy Quran Immunizing the minds of intellectuals against intellectual invasion
...Show More Authors

 

Abstract

              

The Holy Quran is the greatest motivator for the mind to keep pace with life. The doctrine of faith is a requirement of logic and wisdom, and it cannot be reached by the hand of superstition. The Qur’an destroyed the principle of superstition in the verses of the creation of the universe. The principle of inactivity of the Qur’an is a false accusation that collision with the texts of the Qur’an. The secret of scientific development is to harness the laws of nature, benefit from them, and walk according to its requirements, on which the manifestations of civilization and the Qur’an are based, which drives the accusation of the Qur’an of stagnation. The educated class must surrender its minds to God and not slide into the maze of intellectual conquest.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 12 2018
Journal Name
Arab Science Heritage Journal
الحركة مساهمة المرأة في الحركة العلمية من خلال كتاب (( أنباء الغمر بأبناء العمر )) لابن حجر العسقلاني (773هـ/852هـ) (دراسة تاريخية)
...Show More Authors

The search in these subjects makes an importanl accomplishment in the study of the scientific life in that (era)   specialy what the wonen had from a scientific and social level in that(age) the studies of the scientestis which were brilliant in the this era never hed the same as the first scientests . because of the common mistakes toward some resesrchers

View Publication Preview PDF
Publication Date
Mon Mar 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
ادوار إدارة المعرفة التنظيمية و رأس مال الزبون العلاقة والأثر/ دراسة تطبيقية على القطاع المصرفي الأهلي في محافظة النجف الاشرف
...Show More Authors

يختبر البحث الحالي علاقة الأثر والارتباط بين إدارة المعرفة التنظيمية (المتمثلة قيادة المعرفة، تنظيم المعرفة، عمليات المعرفة، ثقافة المعرفة، تطبيق المعرفة، تقاسم المعرفة) ومتغير (رأس مال الزبون) في مجموعة من المصارف الأهلية في محافظة النجف إذ تمثلت مشكلة الدراسة بمدى دور إدارة المعرفة في هذه المصارف فضلاً عن الزبائن الذين يتعاملون معها، وقد استخدمت استمارة الاستبيان كأداة رئيسة لجمع البيانات إذ تم تو

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
DFT Calculations and Experimental Study to Inhibit Carbon Steel Corrosion in Saline Solution by Quinoline-2-One Derivative: Carbon Steel Corrosion
...Show More Authors

A theoretical and protection study was conducted of the corrosion behavior of carbon steel surface with different concentrations of the derivative (Quinolin-2-one), namly (1-Amino-4,7-dimethyl-6-nitro-1H-quinolin-2-one (ADNQ2O)). Theoretically, Density Functional Theory (DFT) of B3LYP/ 6-311++G (2d, 2p) level was used to calculate the optimized geometry, physical properties and chemical inhibition parameters, with the local reactivity to predict both the reactive centers and to locate the possible sites of nucleophilic and electrophilic attacks, in vacuum, and in two solvents (DMSO and H2O), all at the equilibrium geometry. Experimentally, the inhibition efficiencies (%IE) in the saline solution (of 3.5%) NaCl were st

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Wed Oct 17 2018
Journal Name
Journal Of Economics And Administrative Sciences
/ E-Readiness, UTAUT Model, Social Commerce
...Show More Authors

Abstract

Objective / Purpose: Online social relationships through the emergence of Web 2.0 applications have become a new trend for researchers to study the behavior of consumers to shop online, as well as social networking sites are technologies that opened up opportunities for new business models. Therefore, a new trend has emerged, called social trade technology. In order to understand the behavioral intentions of the beneficiaries to adopt the technology of social trade, the current research aims at developing an electronic readiness framework and UTAUT model to understand the beneficiary's adoption of social trade technology.

Design/ methodology/ Approach: To achieve the obje

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 30 2010
Journal Name
المجلة السياسية والدولية
الدور الاقليمي العراقي :رؤية في الثوابت الاستراتيجية والتحديات المستقبلية :دراسة استشرافية للدور الاقليمي العراقي ومقوماته الاستراتيجية والاقتصادية والسياسية الفرص المتاحه والقيود
...Show More Authors

يناقش البحث المقومات المادية والمجتمعية والموضوعية للدور الاقليمي العراقي بعد العام 2010 والفرص المتاحة والقيود التي تحد منه والافاق المستقبلية لهذا الدور في ظل بيئة اقليمية تسودها منظومات تحالف متناقضة في الاهداف والاستراتيجيات

View Publication Preview PDF
Publication Date
Wed Sep 01 2010
Journal Name
Al-khwarizmi Engineering Journal
Free Convection in an Inclined Concentric Annular Square Cavities Filled With Porous Medium and Heated By Non-Uniform Temperature
...Show More Authors

A numerical study of the two-dimensional steady free convection flow in an inclined annulus between two concentric square cavities filled with a porous medium is presented in this paper for the case when the side outer walls are kept with differentially heated temperature while the horizontal outer walls and the inner walls are insulated. The heated wall is assumed to have spatial sinusoidal temperature variation about a constant mean value. The Darcy model is used and the fluid is assumed to be a standard Boussinesq fluid. For the Cartesian coordinate system, the governing equations which were used in stream function form are discretized by using the finite difference method with successive under – relaxation method (SUR) and are solv

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 15 2020
Journal Name
Al-academy
Novel Coronavirus Pandemic as it is Expressed by Children in Their Drawings On-line: An Analytical Study: نزار بن صالح أحمد عبد الحفيظ
...Show More Authors

This study aimed at identifying how children express the emerging coronavirus in general and according to their age groups (4-13 years) by analyzing 91 of their drawings published online, using the descriptive content analytical approach. The results showed that children's artistic expression of the virus came according to the concepts and ideas they carried about the virus for the age groups of (4-7 years) and (7-9 years), while it came according to visual perception for age groups (9-11 years), and from (11-13) years. Also, most children were aware about the presence of the virus and its widespread around the world, but (99%) of them do not realize the seriousness of the virus. It was confirmed that between (25-34%) of children were su

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
تقويم قانون الخدمة الجامعية رقم 23 لسنة 2008 وأثره في تقليل مظاهر الفساد الإداري والمالي: دراسة تحليلية قدية لنصوص القانون وتطبيقاته
...Show More Authors

This research includes an analytical and critique study for the version of the University Service Law No.23 for the year 2008, containing all its aspects and failure whether in its legislation or its applications.

View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of College Of Physical Education
تأثير تمارين الهايبوكسيك على جهاز التجديف الارضي (الاركوميتر) في تحمل السرعة والمستوى الرقمي لفعالية 200متر تجديف كاياك للاعبي المنتخب الوطني للشباب
...Show More Authors

Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
A Semi-Supervised Machine Learning Approach Using K-Means Algorithm to Prevent Burst Header Packet Flooding Attack in Optical Burst Switching Network
...Show More Authors

Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref