Preferred Language
Articles
/
jcois-1405
The omission of letters according to Zakaria al-Ansari in his book (Fath al-Rahman by revealing what is ambiguous in the Qur’an)
...Show More Authors

 

Summary

The book (Fatah al-Rahman reveals what is ambiguous in the Qur’an), which is a book of verbal similarities that tries to touch the Qur’an expression, and the subtle differences between its expressions and expressions. It appeared when it appeared in many chapters, from which I chose to delete in monolithic letters such as Ba and Ta, and to heal and delete in non-monosymbols such as (that) and (may) and (no), so the search came to two chapters The first is for deleting the monolithic letters, and the second is for deleting non-monosyllabic letters, preceded by introductory discussions revolving around the linguistic and idiomatic definition of deletion, a brief translation of the author, and a brief summary of his book, then the practical aspect which is following the sayings of Al-Ansari in the deletion, in the verses that include the deletion, commenting on it authenticity From himself, or from those who preceded him in this regard, and what was mentioned in this research are the issues that he addressed by hadith in this book only.

Key words: ellipsis - letters - Fatah al-Rahman - al-Ansari

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Wed Jun 07 2023
Journal Name
Journal Of Educational And Psychological Researches
Parental Treatment Styles and their Relationship to Self-Efficacy among Middle School Students
...Show More Authors

The current research aims to identify the level of parental treatment methods tolerance, hostility, strictness, and warmth, as well as the level of self-efficacy among middle school students. Moreover, it aims to identify the correlation relationship between the variables of parental treatment methods and self-efficacy among middle school students. The research sample included (150) middle school students. For achieving the objectives of the current research, the researchers adopted a scale of parental treatment methods prepared by (Zughair, 2006), and a scale of self-efficacy prepared by (Youssef, 2016), which were applied in their final form to the research sample. The research reached the following results: parents use a low-level hos

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 01 2017
Journal Name
Italian Journal Of Pure And Applied Mathematics
A NOTE ON STRONGLY FULLY STABLE BANACH ALGEBRA MODULES RELATIVE TO AN IDEAL
...Show More Authors

Let A be a unital algebra, a Banach algebra module M is strongly fully stable Banach A-module relative to ideal K of A, if for every submodule N of M and for each multiplier θ : N → M such that θ(N) ⊆ N ∩ KM. In this paper, we adopt the concept of strongly fully stable Banach Algebra modules relative to an ideal which generalizes that of fully stable Banach Algebra modules and we study the properties and characterizations of strongly fully stable Banach A-module relative to ideal K of A.

Scopus
Publication Date
Mon Jul 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
Semi E<sup>h</sup>-b-preinvexity and its applications to optimization problems
...Show More Authors
Abstract<p>In this paper, the class of semi <italic>E</italic> <sup> <italic>h</italic> </sup>-<italic>b</italic>-preinvex and pseudo <italic>E</italic> <sup> <italic>h</italic> </sup>-b-preinvex functions are defined as an extension of <italic>E-B</italic>-preinvex and <italic>h</italic>-preinvex functions. In this extension the functions <italic>E</italic>:ℝ<sup> <italic>n</italic> </sup> → ℝ<sup> </sup></p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Compare Linear Progamming With Other Methods to Finding Optimal Solution for Transportation Problem
...Show More Authors

The researcher studied transportation problem because it's great importance in the country's economy. This paper which ware studied several ways to find a solution closely to the optimization, has applied these methods to the practical reality by taking one oil derivatives which is benzene product, where the first purpose of this study is, how we can reduce the total costs of transportation for product of petrol from warehouses in the province of Baghdad, to some stations in the Karsh district and Rusafa in the same province. Secondly, how can we address the Domandes of each station by required quantity which is depending on absorptive capacity of the warehouses (quantities supply), And through r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Some Parametric and Non –parametric Methods To Estimate Median Effective Dose ( ED5
...Show More Authors

            In this paper the research represents an attempt of expansion in using the parametric and non-parametric estimators to estimate the median effective dose ( ED50 ) in the quintal bioassay and comparing between  these methods . We have Chosen three estimators for Comparison. The first estimator is
( Spearman-Karber )  and the second estimator is ( Moving Average ) and The Third estimator  is ( Extreme Effective Dose ) .
We used a minimize Chi-square as a parametric method. We made a Comparison for these estimators by calculating the mean square error of (ED50) for each one of them and comparing it with the optimal the mean square

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Fri Aug 10 2018
Journal Name
In Book: Challenges In Mechanics Of Time-dependent Materials, Volume 2edition: 1stchapter: 11
A Case Study to Evaluate Live Load Distributions for Pre-stressed RC Bridge
...Show More Authors

Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Nov 01 2022
Journal Name
Environmental Research
Can electrocoagulation technology be integrated with wastewater treatment systems to improve treatment efficiency?
...Show More Authors

Considerable amounts of domestic and industrial wastewater that should be treated before reuse are discharged into the environment annually. Electrocoagulation is an electrochemical technology in which electrical current is conducted through electrodes, it is mainly used to remove several types of wastewater pollutants, such as dyes, toxic materials, oil content, chemical oxygen demand, and salinity, individually or in combination with other processes. Electrocoagulation technology used in hybrid systems along with other technologies for wastewater treatment are reviewed in this work, and the articles reviewed herein were published from 2018 to 2021. Electrocoagulation is widely employed in integrated systems with other electrochemical tech

... Show More
View Publication
Scopus (84)
Crossref (79)
Scopus Clarivate Crossref
Publication Date
Sun Jul 04 2010
Journal Name
Journal Of Educational And Psychological Researches
guidance program Structured to address therapeutic cognitive emotional disorders (Anxiety and depression model)
...Show More Authors

           Is one of the processes of educational guidance to help the individual to design educational plans that fit with the abilities and inclinations and goals.
And research aims the current instruction program heuristic therapeutic knowledge to deal with emotional disorders. And may the researcher instruct a program according to the theories of interested and competent guidance to education and has studied the large number of studies available in this field, as has been the program on a number of specialists in education and Psychology and took their views. And then was adopted the final version of the indicative program, consistent with the sample, which was built

... Show More
View Publication Preview PDF