Preferred Language
Articles
/
jcois-2002
Ethics (stop harming, guarding the tongue, spreading peace and spending) in the hadiths of the Prophet, book (Faith) from Sahih Al-Bukhari / model - analytical study: : Ethics of restraining harm in the hadiths of the Prophet "Analytical study"
...Show More Authors

(Social values) are of great importance in the lives of nations and peoples as they are the frame of reference that governs the relations of members of society to each other and regulates their life affairs.

And the Prophet of Islam (may God’s prayers and peace be upon him) has told about a group of (social values) such as: spreading peace, feeding food, being fair in dealing with others, and clarifying what a Muslim should have towards his Muslim brother from the safety of the chest and refraining from harming him with the tongue and hand, and so on. Ethics and behaviors that are directly and closely related to (social values).

The best book that abounds with these (social values) and lofty behaviors is the book (The Sahih Mosque) by Imam Al-Bukhari who died in the year (256 AH) from the book (Faith), where the two researchers studied, analyzed and extracted the benefits, patience and sermons learned from these honorable prophetic hadiths

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Russian Journal Of Bioorganic Chemistry
A Brief Review on Schiff Base, Synthesis, and Their Antimicrobial Activities
...Show More Authors

View Publication
Scopus (12)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Mon May 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Comparison hybrid techniques-based mixed transform using compression and quality metrics
...Show More Authors

Image quality plays a vital role in improving and assessing image compression performance. Image compression represents big image data to a new image with a smaller size suitable for storage and transmission. This paper aims to evaluate the implementation of the hybrid techniques-based tensor product mixed transform. Compression and quality metrics such as compression-ratio (CR), rate-distortion (RD), peak signal-to-noise ratio (PSNR), and Structural Content (SC) are utilized for evaluating the hybrid techniques. Then, a comparison between techniques is achieved according to these metrics to estimate the best technique. The main contribution is to improve the hybrid techniques. The proposed hybrid techniques are consisting of discrete wavel

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Materials Today: Proceedings
Energy management and storage systems on electric vehicles: A comprehensive review
...Show More Authors

View Publication
Scopus (56)
Crossref (47)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Educational And Psychological Researches
المناخ المدرسي وعلاقته بالتكيف الاجتماعي لدى تلاميذ الصف الاول الابتدائي في محافظة اربيل/ المركز
...Show More Authors

The research aims at defining the level of the school environment and the social adjustment of the sample due to the sex and the relation among them. The two researchers have stated the school environment scale counting on the theoretical background and previous studies. As for the social adjustment scale, the researchers have used the scale of (Al-Kindy, 2001) and the school environment scale is implicated on (112) students. The schools and the students were elected in a random way. Whereas the social adjustment scale is implicated on (30) teachers in order to know their ratio of the student's adjustment. The results have appeared the satisfaction of the students on the private school environment within their school aspects (the directo

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 01 2010
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
أهمية تحليل بيانات النتائج المالية للعملاء: بحث تطبيقي عن التدقيق والمراجعة في سلطنة عمان
...Show More Authors

The main function of the auditing process is to get a financial report provide information about the activities of the economic entities. The financial report's information is intended to be useful in making decisions and planning for entities future. Such information became more effective and efficient if the auditors process analytical auditing procedures, by using those financial analysis tools, which mean more detailed indicators.

The objectives of this research are to investigate auditor's use of analytical procedures in Oman and identify the main objectives for using these procedures. A questionnaire was used to gather the data for the study. A sample of 65 auditors and the response rate was 80% (52).

  &n

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 01 2008
Journal Name
Journal Of Educational And Psychological Researches
الضغوط النفسية والعوامل الاجتماعية المؤدية إلى الإصابة بأمراض القولون ( بحث ميداني في مدينة بغداد )
...Show More Authors

بالنظر الظروف الراهنة التي يمر بها قطرنا ونتيجة للارتفاع معدل الاصابة بالامراض ذات الطابع النفسي جسمي او ما تعرف بامراض سوء التكيف الناتج عن الضغوط النفسية المستمرة.

ارتأت الحاجة الى دراسة هذا النوع من المرض والتي ترجعها الباحثة الى الاسباب التالية :.

1-تعرض المواطن العراقي الى ضغوط نفسية مستمرة متمثلة بحالة الانفلات الامني والشعور بالقلق المستمر المراف

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2012
Journal Name
Journal Of Educational And Psychological Researches
أثر استعمال الوسائل التعليمية للكتاب المدرسي ورسومات المعلم التوضيحية في تحصيل المعلومات التاريخية واستبقائها
...Show More Authors

The research aims to determine the impact of the use of teaching aids for the textbook and graphics teacher illustrations in the collection of historical information and retention, limited research on a sample of students in grade five numbered (68) primary school students of Benin in Baghdad governorate / Breeding Rusafa First, select the researchers of scientific material for students in research Topics are the first and second chapter of the Book of the Arab-Islamic history, set by the Ministry of Education.

 And promising targets behavioral and according to the content of subject numbered (100) goal and lesson plans exemplary nu

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
مجلة اداب ذي قار
دور الفضائيات الموجهة الناطقة بالعربية في تشكيل معارف واتجاهات الجمهور العراقي ازاء البرلمان العراقي
...Show More Authors