Preferred Language
Articles
/
jcois-2027
Semitism and the allegations of the Jews Presentation, analysis and criticism
...Show More Authors

he aim of the research is to clarify the meanings and connotations of (Semitic), and to identify the peoples that fell under this name according to historical data, biblical texts and Qur’anic news. International sympathy on the one hand and on the other hand controlling the land of Palestine and giving them international legitimacy to grow their entity according to global support and sympathy with their alleged slogan (anti-Semitism), which revolves around the oppression of the Jews.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Engineering
A Real-Time Fuzzy Load Flow and Contingency Analysis Based on Gaussian Distribution System
...Show More Authors

Fuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed  method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Towards Perceptions building a descriptive and procedural for the knowledge assets at the center of learning and growth for the techniques of Balanced Score card in the light of the strategic map concepts to achieve the strategic and operational: requirements of the contemporary business
...Show More Authors

Abstract:

   Witness the current business environment changes rapidly reflected on the performance of the facility wishing to stay , which is no longer style reaction enough to handle installations with their environment , and quickly began to lose its luster with the emergence of a message and the vision of contemporary business environment from a set of parts interacting with each other and the concept of behavioral includes all dimensions of performance, it is imperative to adopt a system installations influence variables and positive interaction through the development of strategic plans and the use of implementation and follow-up strategies to ensure the effectiveness of the method for meas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 11 2023
Journal Name
Engineering Applications Of Computational Fluid Mechanics
Photovoltaic-thermal system combined with wavy tubes, twisted tape inserts and a novel coolant fluid: energy and exergy analysis
...Show More Authors

To create a highly efficient photovoltaic-thermal (PV-T) system and maximise the energy and exergy efficiency, this study aims to propose an innovative configuration of a PV-T system comprising wavy tubes with twisted-tape inserts. Following the validation of a numerical model, a parametric study has been conducted to assess the geometrical effects of twisted tape and wavy tubes, as well as the coolant fluid type and velocity, on the overall performance of a PV-T system, located in Shiraz, Iran. It is found that employing twisted tape improves the energy and exergy efficiency by approx. 6.3%. The best configuration yields 12.4% and 16.8% increase in energy and exergy efficiency compared to conventional PV systems. This is achieved at 15% vo

... Show More
View Publication
Scopus (15)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Mn(II),Fe(III),Co(II)and Rh(III) complexes with azo ligand: Synthesis, characterization, thermal analysis and bioactivity
...Show More Authors

New series of metal ions complexes have been prepared from the new ligand [4-Amino-N-(5-methyl-isaxazol-3-yl)-benzenesulfonamide] derived from Sulfamethoxazole and 3-aminophenol. Accordingly, mono-nuclear Mn(II), Fe(III), Co (II), and Rh(III) complexes were prepared by the reaction of previous ligand with MnCl2.4H2O, CoCl2.6H2O, FeCl3.6H2O and RhCl3H2O, respectively. The compounds have been characterized by Fourier-transform infrared (FTIR), ultraviolet–visible (UV–vis), mass,  1H-, and 13C-nuclear magnetic resonance (NMR) spectra and thermo gravimetric analysis (TGA& DSC) curve, Bohr magnetic (B.M.), elemental microanal

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (5)
Scopus Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Engineering
Comparative Reliability Analysis between Horizontal-Vertical-Diagonal Code and Code with Crosstalk Avoidance and Error Correction for NoC Interconnects
...Show More Authors

Ensuring reliable data transmission in Network on Chip (NoC) is one of the most challenging tasks, especially in noisy environments. As crosstalk, interference, and radiation were increased with manufacturers' increasing tendency to reduce the area, increase the frequencies, and reduce the voltages.  So many Error Control Codes (ECC) were proposed with different error detection and correction capacities and various degrees of complexity. Code with Crosstalk Avoidance and Error Correction (CCAEC) for network-on-chip interconnects uses simple parity check bits as the main technique to get high error correction capacity. Per this work, this coding scheme corrects up to 12 random errors, representing a high correction capac

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2005
Journal Name
Journal Of The College Of Languages (jcl)
The Picture of the romantic hero in: A Bridge Towards the Basific and The Lover
...Show More Authors

This research deals with number of novels for Marguerit Doras , specially A Bridge Towards Basfic and The Lover . we specialize the first chapter for discussing a very important issue , which is the Maraguerit Doras novelist world in another word the most important themes . that we discuss and through that we tried to clerify the privacy the characters of Marguerit Doras in comparative with her own generation and in the second chapter we discussed the most important characteristics of the romantic hero spedially the characteristics of women in her novels.

View Publication Preview PDF
Publication Date
Thu Jun 26 2025
Journal Name
Journal Of Studies And Researches Of Sport Education
The effectiveness of the use of yoga exercises and its impact on the reactions of the two Alvesologih nervous and respiratory systems in the correction of antenna pistol shooting accuracy
...Show More Authors

View Publication Preview PDF
Publication Date
Thu Mar 30 2006
Journal Name
College Of Islamic Sciences
The Islamic call for the unity of human society and the rejection of division
...Show More Authors

الحمد الله أولا واخرا وبعد .. إن الواقع الذي عايشه الناس في ظل دولة المسلمين منذ إقامة دولة الإسلام بعد بعثة الرسول الكريم (صلى الله عليه وسلم ) في المدينة ولأكثر من أربعة عشر قرنا نرى إنه عاش في كنف هذه الدولة الكبيرة من بلاد الصين شرقا وإلى وسط أوربا وجنوب فرنسا غربا العشرات من الملل و الأديان والأجناس وممن لا يدينون بالإسلام وهم كما تحفظ لهم دولة الإسلام منهم وعيشهم الرغيد فهم يمارسون شعائرهم وطقوسهم الديني

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 15 2023
Journal Name
Al-academy
Scenography and the effectiveness of meaning in the theatrical space
...Show More Authors

The elements of theater formation that fall within the spatial experience of the scenography of the show, which the directors work in in the imaginary theater, are important and have an aesthetic, intellectual and cognitive dimension, working to highlight reality in an aesthetic image surrounding space and space. And its relationship to the distinct, multiple and variable spaces above the stage, to produce theatrical signals and endless meanings through the possibility of infinite reconfiguration of the theater's space and its public and private space through the distribution of a group of blocks within the scenic image.
I dealt with in the first chapter (the methodological framework), which includes the research problem identified

... Show More
View Publication Preview PDF
Crossref