Preferred Language
Articles
/
jcois-2051
Thematic consistency in Surat Al-Gashiyah
...Show More Authors

research aims: 1- Demonstrating an aspect of the rhetorical miracle of the Qur’an represented in the accuracy of its verses and the consistency of its topics. 2- Clarifying the intent of Surat Al-Ghashiya, and clarifying the link between the topics of the surah and its purpose. 3- Studying the topics included in Surat Al-Gashiya, and highlighting their consistency among them. 4- Referring to the gifts contained in the noble verses.Research Methodology: In preparing this study, I followed the inductive-analytical approach, according to the procedures outlined in the introduction.From the search results: 1- The purpose of Surat Al-Gashiya: Reminding the Hereafter and its scenes of reward for the believers and punishment for the unbelievers, and to draw attention to the proofs of the power of the Lord of the worlds. The topics of this surah are consistent with each other, and closely related to the purpose of the surah. 2- Faces of proportionality appeared between Surat Al-Ala and Al-Ghashiah, as well as between Surat Al-Ghashiah and Al-Fajr, and the opening of Surat Al-Ghashiah corresponds to its conclusion, and the name of the surah matches its purpose and date of revelation. 3- Definition of objective consistency: it is the regularity of the topics of the surah and their connection to each other. 4- The study of objective consistency is one of the most important reasons for arriving at the objective unity of the surah and determining its purpose.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 05 2021
Journal Name
جامعة بغداد/ كلية التربية للعلوم الصرفة - ابن الهيثم
امتلاك الطالبات لمهارات التفكير المنظومي المتضمنة في كتاب الرياضيات للصف الثالث المتوسط
...Show More Authors

Publication Date
Mon Dec 26 2022
Journal Name
Arab Science Heritage Journal
العمق الوجداني والانفعال العاطفي لدى شعراء القرنين السابع والثامن الهجريين في الأندلس
...Show More Authors

The Andalusi did not leave any poetic art without expressing his psychological and sentimental emotions and the depth of emotions and it sincerity. We found Andalusian translated his emotions into poetry and in many different subjects

View Publication Preview PDF
Publication Date
Sun Jun 07 2020
Journal Name
دراسات دولية
دور السياسة الخارجية العراقية في تفعيل الاداء الدبلوماسي لمرحلة مابعد العام 2003
...Show More Authors

ان مرتكزات السياسة الخارجية العراقية لمرحلة ما بعد العام 2003 قد عكست توجهات ايجابية قادت الى صياغة مجموعة من الرؤى والتصورات الاستراتيجية الجديدة التي افضت الى اعتماد وتوظيف الوسائل والقنوات الدبلوماسية بوصفها وسائل فعالة وبطريقة متكاملة ومتوازنة من اجل تعزيز مستويات الاداء الفعلي وتحقيق جميع الاهداف المستقبلية للسياسة الخارجية العراقية في ضوء صياغة معادلة مفادها: تدعيم وترصين اداء مؤسسات صنع السياسة ال

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 15 2008
Journal Name
اطروحة دكتوراه
الاقليمية الدولية الجديدة في عالم ما بعد الحرب الباردة : انموذج آسيا الباسفيك
...Show More Authors

The thesis discusses the concept of the new international regionalism that emerged after the growing effects and repercussions of globalization with its economic, political and security dimensions after the end of the Cold War and the crystallization of a different international system dominated by the United States of America, so that the major countries and actors in the international system realize the danger of globalization and move towards adopting regional arrangements to contain the negative effects of globalization. The Asia-Pacific model was chosen as a model for the study.

View Publication
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Thu Jun 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
The Impact of Governance Mechanisms on the Accounting Disclosure of the Sustainable Development of Iraqi Economic Units
...Show More Authors

The research aims to demonstrate the impact of governance mechanisms on the quality of financial reports in the light of the accounting disclosure for sustainable development represented in (accounting disclosure for economic development, accounting disclosure for environmental development, and accounting disclosure for social development) in a sample of banks listed in the Iraq Stock Exchange.

Governance mechanisms were measured by evaluating and analyzing the mechanisms in banks for the research sample consisting of (15) banks, based on the governance guide issued by the Central Bank, as well as the banks’ financial reports for the years 2016 -2018, and the dimensions of accounting disclosure for sust

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jan 04 2013
Journal Name
المجلة السياسية والدولية
عوامل تكوين الرأي العام وتأثيره في السياسه الخارجيه المصريه بعد عملية التغيير
...Show More Authors

View Publication
Publication Date
Sat Dec 01 2018
Journal Name
Al-nahrain Journal Of Science
Image Classification Using Bag of Visual Words (BoVW)
...Show More Authors

In this paper two main stages for image classification has been presented. Training stage consists of collecting images of interest, and apply BOVW on these images (features extraction and description using SIFT, and vocabulary generation), while testing stage classifies a new unlabeled image using nearest neighbor classification method for features descriptor. Supervised bag of visual words gives good result that are present clearly in the experimental part where unlabeled images are classified although small number of images are used in the training process.

View Publication Preview PDF
Crossref (23)
Crossref
Publication Date
Fri Nov 29 2019
Journal Name
Iraqi Journal Of Physics
Synthesis and Characterization of P3HT Metal Nanoparticles Hybrid Junction
...Show More Authors

In this work the fabrication and characterization of poly(3-hexylthiophene) P3HT-metallic nanoparticles (Ag, Al). Pulsed Laser Ablation (PLA) technique was used to synthesis the nanoparticles in liquid. The Fourier Transformer Infrared (FTIR) for all samples indicate the chemical interaction between the polymer and the nanoparticles. Scanning Electron Microscopic (SEM) analysis showed the particle size for P3HT-AgNps samples between 44.50 nanometers as well the spherical structure. While for P3HT-AlNps samples was flakes shape. Energy Dispersive X-ray (EDX) spectra show the existing of amount of metallic nanoparticles.

View Publication Preview PDF
Crossref
Publication Date
Mon Feb 10 2025
Journal Name
Journal Of Optics
Implementing quantum key distribution based on coincidence detection captured from two different single photon detection modules
...Show More Authors

Quantum key distribution (QKD) provides unconditional security in theory. However, practical QKD systems face challenges in maximizing the secure key rate and extending transmission distances. In this paper, we introduce a comparative study of the BB84 protocol using coincidence detection with two different quantum channels: a free space and underwater quantum channels. A simulated seawater was used as an example for underwater quantum channel. Different single photon detection modules were used on Bob’s side to capture the coincidence counts. Results showed that increasing the mean photon number generally leads to a higher rate of coincidence detection and therefore higher possibility of increasing the secure key rate. The secure key rat

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref