Preferred Language
Articles
/
jcois-1359
(Behavioral and ethical reasons for happiness in the holy Qur’an, elected models)
...Show More Authors

Research Summary:

Seeking happiness and searching for it have been among the priorities of mankind from the beginning of his creation and will remain so until the end of this world, and even in the next life, he seeks happiness, but the difference is that a person can work in this world to obtain it, but in the next life he is expected to get what he done in this world. And among these reasons are practical actions that a person undertakes while he intends to draw close to God Almighty, so they lead him to attain his desired perfection, and to attain his goals and objectives, which is the minimum happiness in this life, and ultimate happiness after the soul separates the body, and on the day of the judgment, Among these important ethical behavioral reasons are: following the guidance, fear of God and not following whims and desires, the fear of God Almighty, submission and obey to God, purification of the soul, integrity, seeking lawful livelihood, and sincere repentance.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 08 2015
Journal Name
Chemical And Process Engineering Research
Uni and Simplex Optimization for the Spectrophotometric Determination of Erythromycin ethylsuccinate Drug via Charge-Transfer Complex Formation
...Show More Authors

Charge transfer complex formation method has been applied for the spectrophotometric determination of erythromycin ethylsuccinate, in bulk sample and dosage form. The method was accurate, simple, rapid, inexpensive and sensitive depending on the formed charge- transfer complex between cited drug and, 2,3- Dichloro-5,6-dicyano-p- benzoquinone (DDQ) as a chromogenic reagent. The formed complex shows absorbance maxima at 587 nm against reagent blank. The calibration graph is linear in the ranges of (10 - 110) μg.mL-1 with detection limit of 0.351μg.mL-1. The results show the absence of interferences from the excipients on the determination of the drug. Therefore the proposed method has been successfully applied for the determination of eryth

... Show More
Preview PDF
Publication Date
Fri Jun 17 2016
Journal Name
International Journal Of Humanities And Cultural Studies
Defying Post Colonialism: the Quest for Cultural Adaptation and Transcultural Identity with References to Some Postcolonial Novels
...Show More Authors

Postcolonial reading for any text aroused a great controversy that deserves to be studied it give more dimensions with the awareness that it can be interpreted in numerous ways. Postcolonialism is a challenging field as it covers variety of political, psychological, cultural, and economical activities often called ‘postcolonial’. The concept of culture worked effectively in shaping and mapping postcolonial struggles, which have so profoundly reshaped our world. Man's sense of cultural displacement is the core of this project. Man's quest for cultural adaptation forms a kind of equilibrium and compromise to the vision of human liberation. It is very important to minimize disadvantages and to internalize the logic of Western colonization.

... Show More
Publication Date
Wed Mar 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
The Conductivity of AC, Loss Tangent, and Relative Permittivity for Composites of PVC Paste/Graphite Electrode Waste
...Show More Authors

The behavior of AC conductivity (σac), loss tangent (tan δ), and relative permittivity (ε′) for composites of PVC-P/graphite electrode waste (GEW) was investigated, and a qualitative explanation was provided as a function of PVC-P weight fractions (0, 5, 10, 15, 20, and 25) wt. percent, temperature (30-90) °C, and frequency (100Hz-2MHz). The behaviors of the composites' ac. conductivity and impedance as a frequency function and temperature have been examined. The permittivity was shown to rise with increasing temperature (Tg). The relative permittivity increased as the GEW filler concentration increased and was highest in the low-frequency range; nevertheless decreased as the frequency increased.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Calibration and verification of the hydraulic model for Blue Nile river from Roseires dam to Khartoum city
...Show More Authors

This research represents a practical attempt applied to calibrate and verify a hydraulic model for the Blue Nile River. The calibration procedures are performed using the observed data for a previous period and comparing them with the calibration results while verification requirements are achieved with the application of the observed data for another future period and comparing them with the verification results. The study objective covered a relationship of the river terrain with the distance between the assumed points of the dam failures along the river length. The computed model values and the observed data should conform to the theoretical analysis and the overall verification performance of the model by comparing it with anothe

... Show More
Publication Date
Fri May 17 2013
Journal Name
International Journal Of Computer Applications
Applied Minimized Matrix Size Algorithm on the Transformed Images by DCT and DWT used for Image Compression
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Comparison of Mercury Intrusion and Nitrogen Adsorption Measurements for the Characterization of Certain Natural Raw Materials Deposits
...Show More Authors

The porosity of materials is important in many applications, products and processes, such as electrochemical devices (electrodes, separator, active components in batteries), porous thin film, ceramics, soils, construction materials, ..etc. This can be characterized in many different methods, and the most important methods for industrial purposes are the N2 gas adsorption and mercury porosimetry. In the present paper, both of these techniques have been used to characterize some of Iraqi natural raw materials deposits. These are Glass Sand, Standard Sand, Flint Clay and Bentonite. Data from both analyses on the different types of natural raw materials deposits are critically examined and discussed. The results of specific surface are

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Electronics,computer Networking And Applied Mathematics
Comparison of Some Estimator Methods of Regression Mixed Model for the Multilinearity Problem and High – Dimensional Data
...Show More Authors

In order to obtain a mixed model with high significance and accurate alertness, it is necessary to search for the method that performs the task of selecting the most important variables to be included in the model, especially when the data under study suffers from the problem of multicollinearity as well as the problem of high dimensions. The research aims to compare some methods of choosing the explanatory variables and the estimation of the parameters of the regression model, which are Bayesian Ridge Regression (unbiased) and the adaptive Lasso regression model, using simulation. MSE was used to compare the methods.

View Publication
Crossref
Publication Date
Sun Dec 05 2010
Journal Name
Baghdad Science Journal
Pre-Test Single and Double Stage Shrunken Estimators for the Mean of Normal Distribution with Known Variance
...Show More Authors

This paper is concerned with pre-test single and double stage shrunken estimators for the mean (?) of normal distribution when a prior estimate (?0) of the actule value (?) is available, using specifying shrinkage weight factors ?(?) as well as pre-test region (R). Expressions for the Bias [B(?)], mean squared error [MSE(?)], Efficiency [EFF(?)] and Expected sample size [E(n/?)] of proposed estimators are derived. Numerical results and conclusions are drawn about selection different constants included in these expressions. Comparisons between suggested estimators, with respect to classical estimators in the sense of Bias and Relative Efficiency, are given. Furthermore, comparisons with the earlier existing works are drawn.

View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (22)
Crossref (10)
Scopus Crossref