Preferred Language
Articles
/
jcois-2234
Rwandan branches and objectives
...Show More Authors

This is a search for Al-Rwandiyah and its heretical deviant sects, and its destructive goals that targeted the Arab nation, and its true Islamic religion in order to exhale poisons of demolition and sabotage, leading to its racist, populist goals ( ) that the Magi aspire to to restore the so-called ancient Persian glories, and undermine the Abbasid caliphate.
Al-Biruni said: (And that a person will emerge who will restore the Magian state and seize all the land, and remove the king of the Arabs) (), and among the indications of Ibn Al-Nadim is that a populist man called Muhammad bin Al-Hussein who was turned into Zaidan () was (claiming... the transition of the Islamic state to a state Persia ..... and their religion, which is the religion of the Magians) (), and Ibn Al-Qaddah () had appeared to Zaidan and helped him with money, and helped him with men, so when Zaidan died, the matter became consistent with Ibn Al-Qaddah ().
Al-Baghdadi commented on this and said: (I do not find a Magi on the surface of the earth except that he is a loyalist waiting for their appearance at home, thinking that the king will return to them) Therefore, the destructive movements of their different walks and divergent ideas invested in the doctrine of solutions, reincarnation and interpretation to distort the image of Islam and obliterate the features of the Arab heritage. However, the vigilance and acumen of the Abbasid caliphate in the first Abbasid era dispelled its dreams and undermined its ideas by resolutely confronting it.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 31 2023
Journal Name
College Of Islamic Sciences
Heretic rulings And related words in Islamic jurisprudence
...Show More Authors

How I was eager to research the ruling on three of the most dangerous types to Islam and Muslims (the heretic, the sorcerer, the innovator, and related terms).
Because it is the most dangerous deadly disease that destroys the hearts of Muslims, and may even expel a Muslim from the circle of Islam, and how many Muslims have done or committed such a thing without knowing it. Indeed, how many Muslims have left Islam and whose wife has abandoned him without realizing it, and among them are those who have committed it without knowing it. As well as related words associated with heresy.( )
Because people debated such matters between extremists and lenient ones, most of whom were extremists, and they did not reach a conclusion. So I decid

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 31 2015
Journal Name
Al-khwarizmi Engineering Journal
Profiles and Geotechnical Properties for some Basra Soils
...Show More Authors

 Abstract

Basra province is known for its logistic location for trading activity and oil industry. By geological point of view, Basra areas are believed to consist mainly of alternation of (clay, silty clay, clayey silt, silt and sand) type of soil. Any development of industry in this area should be affected by the occurrence of the clay soil. That is why the investigation to the soil is more than necessary. In this case, a vast testing program was carried out by the author to evaluate the various formations constituting the of some Basra soils. An attempt to characterize and discuss the nature, minerals, engineering behavior and field properties of soil samples extracted from more than one thousand and one

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 16 2018
Journal Name
Al-academy
Melodic and Rhythmic Construction of Monologues in Iraq
...Show More Authors

The research studies the melodic and rhythmic characteristics of monologue, in addition to how it was transferred from the Arab homeland to Iraq and   reviewed its most prominent performers, as well as a review     of the monologue types and their propagation in the Arab homeland such as comical, dramatic, and political and guidance monologues. 

The methodological framework included: the problem of the research, the importance of the research and the objective of the research which is to uncover the melodic and rhythmic structure of the monologue in Iraq.   The limits of the research included the objective limit tackling the  art of monologue and the spatial limit which is Baghdad

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Second International Conference On Innovations In Software Architecture And Computational Systems (isacs 2022)
Structural flexibility and its impact on contemporary architecture
...Show More Authors

. The concepts of structural flexibility became one of the important goals in the design phases to reach high performance in architecture. The pioneering projects and ideas that linked architecture with technologies and scientific innovations appeared, with the aim of reaching projects that mix the concepts of flexibility with the development of machine thought and modern technology to meet the functional, environmental, and aesthetic requirements for human wellbeing. The aim of this paper is to identify the mechanisms used in order to reach flexible structural systems capable of accommodating technological changes and developments. The research hypothesizes that the structural design according to the concepts of flexibility achieves high s

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 01 2008
Journal Name
Baghdad Science Journal
Relationship between Diabetes mellitus and Urinary tract infections
...Show More Authors

Blood and urine samples were collected from 203 patients to study the relationship between Diabetes mellitus and urinary tract infections (UTI). Blood and urine specimens were subjected for estimation of random blood sugar, in addition to detection of the most pathogen bacteria which cause urinary tract infection in diabetic patients. The study included the detection of bacterial sensitivity to some antibiotics used in treating urinary tract infections, and also included the study of genetic basis which cause both types of diabetes mellitus. The results can be summarized as follows: The incidence of type ? diabetes in males was (35.8%), and (45.9%) in females . and type 2 diabetes in males was (49.6%), while in females was (40.16%).The inc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Engineering
Predicted Affinity Ratio between Asphalt Binder and Aggregate
...Show More Authors

Affinity is a term used to describe the amount of the adhesion bond between asphalt binder and aggregate. Adhesion force may be used as indicator to the amount of energy or work required to breakdown the adhesive bond between asphalt binder and aggregate. In order to study affinity between asphalt binder and aggregate, a modified device is manufacture locally similar to Rolling Bottle Test (RBT) to Predicted the degree of affinity between asphalt binder and aggregate; taking into consideration mineral composition with physical properties of asphalt binder to measure required force to separate asphalt binder from aggregate surface. In this study, suggest new parameters to represent the stripping or affinity phenomena (aff

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
COMPUTER-BASED ECG SIGNAL ANALYSIS AND MONITORING SYSTEM
...Show More Authors

This paper deals with the design and implementation of an ECG system. The proposed system gives a new concept of ECG signal manipulation, storing, and editing. It consists mainly of hardware circuits and the related software. The hardware includes the circuits of ECG signals capturing, and system interfaces. The software is written using Visual Basic languages, to perform the task of identification of the ECG signal. The main advantage of the system is to provide a reported ECG recording on a personal computer, so that it can be stored and processed at any time as required. This system was tested for different ECG signals, some of them are abnormal and the other is normal, and the results show that the system has a good quality of diagno

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 02 2017
Journal Name
Journal Of Educational And Psychological Researches
Educational values and their role in some religions
...Show More Authors

                           
 The Islamic religion approach Rabbani urges and seeks to bring happiness to people, as Allah says: ((We sent thee not all people glad tidings and a warner, but most people do not know)) Spa: State 28
   Islam looks at the concept of educational values ​​through positive behavior derived emerging through formal and informal education. The Islamic approach works on the basis of a systematic and clear rule in the form of an integrated system includes multiple areas. As the lead actor role as the desired position.
  Although 

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 18 2004
Journal Name
Iraqi Journal Of Laser
Quantum Cryptography and a Quantum Key Distribution Protocol
...Show More Authors

In this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.

View Publication Preview PDF
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF