Preferred Language
Articles
/
jcois-2010
AYĀT AL-HUJJAH FĪ SŪRAT AL-ANĀM RIWĀIAH WA DERĀIAH ( a model in three verses from Surat Al-An’am 108-110)
...Show More Authors

 

The current research discusses the jurisprudence of the argumentative meaning in the Qur’an, and it is one of the general methods of responses in the Qur’an, as well as the argumentative approach to the recitations of the readers and directing their meanings. I have chosen a model for three verses from Surat Al-An’am, in which there are seven frequent recitations and seven odd ones, on a topic related to theology and faith; It forms the centerpiece of the argument verses in Surat Al-An'am; It contains the jurisprudence of dealing with infidels and dissenters, turning away and forbidding insulting what they claim besides God in the event of corruption, and God Almighty’s decree and wisdom in the occurrence of unbelief with what he celebrates in the tongues, hearts and eyes of the deniers. We need in every age such kind of methods of the Qur’an, especially this era. The importance of this model emerges in the alternation of the two methods of declaring and indoctrination of the argument, and that is the statement of the divine approach in dealing with violators and responding to them as well. And it is a comma in the verses of argument in the entire surah, and after them he said easily: “The word of your Lord has been fulfilled in truth and justice.” I took the balancing approach to the sayings, the meanings of the recitations and their guidance; and exclude for what may be problems.

The most prominent findings: Proving one of the evidences for the source of the divine Qur’an; Because there is no one in the methods of human argument who decides the argument and teaches it at the same time with such strength and understanding in all respects, this is only in the Qur’an, and the statement of part of the Qur’an’s approach in the method of argument is a report we received. The frequent collection with odd in this abundance is evidence of the circumstances of the descent. I recommended writing a scientific thesis to trace Surat Al-An’am as a whole in this type of method of the Qur’an as a report, rooting and criticism of what contradicted from the methods of human beings in argument; As well as writing in rooting the science of argument and the controversy of the Qur’an from the Qur’an itself and tracing its applications.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 12 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Parents' Knowledge about Type I Diabetes Mellitus at Diabetes and Endocrine Treatment Centers in Baghdad City
...Show More Authors

Objectives: The current study aims to evaluate parents' knowledge towards diabetes mellitus (type I); to identify the association between parents' knowledge and their demographic characteristics; and to identify the association between parents' knowledge and demographic characteristics of their children. Methodology: Descriptive study carried out during the period from January to April 2015 on purposive sample of 100 parents with their children with diabetes mellitus who attending diabetes and endocrine treatment center. An evaluation tool is constructed by the researcher based on previous literature regarding

... Show More
View Publication Preview PDF
Publication Date
Sun Aug 15 2021
Journal Name
Annals Of R.s.c.b.
Versatile Applications of Complexes with Some Lanthanide Elements: A Review
...Show More Authors

Cerium (III), Neodymium (III) and Samarium (III) Complexes existent a wide range of implementation that stretch from their play in the medicinal and pharmaceutical area because of their major significant pharmacological characteristic such as antifungal, anti-cancer, anti-bacterial ,anti-human immunodeficiency virus ,antineoplastic, anti-inflammation,inhibition corrosion,in some industrial (polymers, Azo dye).It is likely to open avenuesto research among various disciplines such as physics, electronics, chemistry and materials science by these complexes that contain exquisitely designed organic molecules.This paper reviews the definition, importance and various applications of Cerium (III), Neodymium (III) and Samarium (III) Complexes anddi

... Show More
Publication Date
Fri Mar 30 2018
Journal Name
International Journal Of Multimedia And Image Processing
The Design of a Multimedia-Forensic Analysis Tool (M-FAT)
...Show More Authors

Digital forensics has become a fundamental requirement for law enforcement due to the growing volume of cyber and computer-assisted crime. Whilst existing commercial tools have traditionally focused upon string-based analyses (e.g., regular expressions, keywords), less effort has been placed towards the development of multimedia-based analyses. Within the research community, more focus has been attributed to the analysis of multimedia content; they tend to focus upon highly specialised specific scenarios such as tattoo identification, number plate recognition, suspect face recognition and manual annotation of images. Given the ever-increasing volume of multimedia content, it is essential that a holistic Multimedia-Forensic Analysis Tool (M-

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue Jan 31 2023
Journal Name
Journal Of Legal Sciences
Compensation for Psychological Damage Caused by Negligence - A Comparative Study
...Show More Authors

Psychological damage is one of the damages that can be compensated under the fault of negligence in the framework of English law, where the latter intends to include an enumeration of civil errors on the basis of which liability can be determined, and aims under each of these errors to protect a specific interest (for example, defamation protects Among the damage to reputation and inconvenience are the rights contained on the land), and the same is true for the rest of the other errors. Compensation for psychological damage resulting from negligence has raised problems in cases where the psychological injury is "pure", that is, those that are not accompanied by a physical injury, which required subjecting them to special requirements by the

... Show More
View Publication
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Ain Shams Engineering Journal
A semi-analytical iterative method for solving differential algebraic equations
...Show More Authors

View Publication
Crossref (9)
Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Al–bahith Al–a'alami
A Semiotic Approach to the Analysis of the News Story
...Show More Authors

This study attempts to provide an approach analysis for the news, depending on the bases and principles which conceptuality semiotic researchers of this field first of them «A. J. Gremas» for the theory of «narrative discourse analysis», to more clarify we tried to apply it on a published press- news, to concludes the most important steps and methods that are necessary to follows gain more understanding of the press- news.

View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Chemical Sensor Based on a Hollow-Core Photonic Crystal Fiber
...Show More Authors

In this work a chemical sensor was built by using Plane Wave Expansion (PWE) modeling technique by filling the core of 1550 hollow core photonic crystal fiber with chloroform that has different concentrations after being diluted with distilled water. The minimum photonic bandgap width is.0003 and .0005 rad/sec with 19 and 7 cells respectively and a concentration of chloroform that filled these two fibers is 75%.

View Publication Preview PDF
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref