Preferred Language
Articles
/
jcois-2010
AYĀT AL-HUJJAH FĪ SŪRAT AL-ANĀM RIWĀIAH WA DERĀIAH ( a model in three verses from Surat Al-An’am 108-110)
...Show More Authors

 

The current research discusses the jurisprudence of the argumentative meaning in the Qur’an, and it is one of the general methods of responses in the Qur’an, as well as the argumentative approach to the recitations of the readers and directing their meanings. I have chosen a model for three verses from Surat Al-An’am, in which there are seven frequent recitations and seven odd ones, on a topic related to theology and faith; It forms the centerpiece of the argument verses in Surat Al-An'am; It contains the jurisprudence of dealing with infidels and dissenters, turning away and forbidding insulting what they claim besides God in the event of corruption, and God Almighty’s decree and wisdom in the occurrence of unbelief with what he celebrates in the tongues, hearts and eyes of the deniers. We need in every age such kind of methods of the Qur’an, especially this era. The importance of this model emerges in the alternation of the two methods of declaring and indoctrination of the argument, and that is the statement of the divine approach in dealing with violators and responding to them as well. And it is a comma in the verses of argument in the entire surah, and after them he said easily: “The word of your Lord has been fulfilled in truth and justice.” I took the balancing approach to the sayings, the meanings of the recitations and their guidance; and exclude for what may be problems.

The most prominent findings: Proving one of the evidences for the source of the divine Qur’an; Because there is no one in the methods of human argument who decides the argument and teaches it at the same time with such strength and understanding in all respects, this is only in the Qur’an, and the statement of part of the Qur’an’s approach in the method of argument is a report we received. The frequent collection with odd in this abundance is evidence of the circumstances of the descent. I recommended writing a scientific thesis to trace Surat Al-An’am as a whole in this type of method of the Qur’an as a report, rooting and criticism of what contradicted from the methods of human beings in argument; As well as writing in rooting the science of argument and the controversy of the Qur’an from the Qur’an itself and tracing its applications.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
A Hyperbolic Potential Field Model for Designing an Einzel Lens of Low Aberrations
...Show More Authors

An analytical model in the form of a hyperbolic function has been suggested for the axial potential distribution of an electrostatic einzel lens. With the aid of this hyperbolic model the relative optical parameters have been computed and investigated in detail as a function of the electrodes voltage ratio for various trajectories of an accelerated charged-particles beam. The electrodes voltage ratio covered a wide range where the lens may be operated at accelerating and decelerating modes. The results have shown that the proposed hyperbolic field has the advantages of producing low aberrations under various magnification conditions and operational modes. The electrodes profile and their three-dimensional diagram have been determined whi

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Bulletin Of Electrical Engineering And Informatics
A model for incorporating suitable methods of usability evaluation into agile software development
...Show More Authors

The challenge to incorporate usability evaluation values and practices into agile development process is not only persisting but also systemic. Notable contributions of researchers have attempted to isolate and close the gaps between both fields, with the aim of developing usable software. Due to the current absence of a reference model that specifies where and how usability activities need to be considered in the agile development process. This paper proposes a model for identifying appropriate usability evaluation methods alongside the agile development process. By using this model, the development team can apply usability evaluations at the right time at the right place to get the necessary feedback from the end-user. Verificatio

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Wed Sep 30 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Impact of Earnings Quality using the Sustainability model (Persistence) and predictability in the Continuity of the Banks: بحث تطبيقي في عينة من المصارف التجارية المدرجة في سوق العراق للاوراق المالية
...Show More Authors

The research aims to measure the extent of the impact of Earnings quality in the continuity of the company for a sample of private commercial banks listed on the Iraq Stock Exchange. The research sample included (15) of the listed commercial banks that continue to issue their financial statements for the period from (2009-2018).The research relied on three main models of measurement and on four steps. The first step is to measure the Persistence (Earnings Quality) by Depending the sustainability model. While the second step included measuring the Predictability of accounting profits by deriving the square root of the disparity of the estimation error from the first model Persistence (Earnings Quality), and the third step included

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
Polygamy and its impact on academic achievement and self-confidence among a sample from Sattam bin Abdul Aziz University students
...Show More Authors

The study aimed to recognize the impact of polygamy on academic achievement and self-confidence among Sattam bin Abdul Aziz University students. To achieve this goal, the researchers used the Descriptive Analytical method using The Self Confidence measurement ,that has been prepared for the purposes of this study, consists set of 29 questions, then applied to the students sample that emerges from polygamy and one- wife families, study sample consists of randomly selected 230 students registered for the year .1435-1436
The results of the study showed presence of medium statistical impact on the significance level (a 4 0.05), this proof significant statistical effect of polygamy on self-confidence among the sample of Prince Sat-tam Univ

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of The College Of Languages (jcl)
Metaphor in Political Discourse Press Articles By Louis Bassets As A Model: La metáfora en el discurso político. Los artículos de Lluís Bassets como ejemplo
...Show More Authors

       The present paper focuses on studying a rhetorical form often used in Spanish linguistic discourse .It also examines the study two sides (theoretical and practical), the concept of metaphor, the most important modern school that deals with this issue, the development of this technique and its relationship with other intellectual ideologies, and the role metaphor plays in interpreting the meaning of the linguistic discourse especially in conveying political message. The study allows the formulation and the creation of a conceptual picture for the purposes of metaphor in the linguistic discourse used in Spanish press. It investigates discursive models from the Spanish press,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 30 2018
Journal Name
دراسات في التاريخ والاثار
unpublished cuneiform texts from the Iraqi Museum (confiscation)
...Show More Authors

The research included studying a group of eight cuneiform texts dating back to the Old Babylonian era, specifically to the reign of King Larsa Rim-Sin, which were identified through studying the historical versions of these texts. These texts are confiscated, i.e. texts of unknown location, because they did not come through excavations, but rather came to the Iraqi Museum either by people who obtained them through digging, or stolen and smuggled texts that are retrieved by the General Authority for Antiquities; as is the case with our texts that were found smuggled to Jordan and were retrieved by the General Authority for Antiquities.

Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Legal Sciences
Industrial Property Licensing Contracts are Exempted from Ban in Accordance with USA and European Law
...Show More Authors

Intellectual property rights of all kinds، and their nature، are considered a tool in the hands of their owner that enables him to monopolize the benefits that you confer on them without any dispute or mediation from anyone. Intellectual property on its intellectual product، and preventing others from exploiting it without obtaining the permission of its owner All of this is reflected positively on the progress of the industrial and commercial field، and this justifies the protection provided by the laws regulating intellectual property rights to its owner، whether at the national or international level، and with our recognition of the right of the owner of intellectual property rights to enjoy the exclusive use of his right، and

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 31 2011
Journal Name
Al-khwarizmi Engineering Journal
Simulation of Oxygen Mass Transfer in an Internal Loop Airlift Reactor with Axial Dispersion Model
...Show More Authors

The effect of superficial gas velocity within the range 0.01-0.164 m/s on gas holdup (overall, riser and down comer), volumetric oxygen mass transfer coefficient, liquid circulation velocity was studied in an internal loop concentric tubes airlift reactor (working volume 45 liters). It was shown that as the usg increases the gas holdup and also the liquid circulation velocity increase. Also it was found that increasing superficial gas velocity lead to increase the interfacial area that increases the overall oxygen mass transfer coefficient. The hydrodynamic experimental results were modeled with the available equations in the literature. The predicted data gave an acceptable accuracy with the empirical data.

The final

... Show More
View Publication Preview PDF