Preferred Language
Articles
/
jcois-350
Preservation of the mind and its development Makassedi study in the light of prayers Almathur
...Show More Authors

A great abbey in the Shari'a, and is therefore destined to be preserved in many texts and by methods
There are many prayers in the Qur'an and Sunnah to encourage them
They have a clear relationship with the preservation of the purposes of the Sharia in general, and with a purpose
Save the mind in particular, but the scholars - the mercy of God - when they declare that the costs of Sharia
Due to the preservation of my intentions in the creature, they limit their words to orders and intentions, and are not exposed
In particular,
If they were included in the texts of the Shariah and Tawjiyatiya,
To be related to the preservation of the purposes of the law, which confirms the words of the former leaders, and light the light of something
 The authors of the literature did not win
 T
 Big
After detail, this research has collected a number
Of the prayers received, and highlighted the meanings that indicate their relationship to one of the purposes
Sharia, Wei save the mind and Tomato.
Roses prayers ask the poison Via asthma to protect the sterility of spoilers sensory and moral, and that Yibo
Elio seeks to preserve the
The law was also brought to the supplications that preserve the mind by nothingness;
Prevent the causes of the risks that are or are expected, and drive supplications that included the desire to save the mind by removing
The causes of sterile diseases, and trade with a great evil of the mind, taboos and morals
He is mindful of removing the mourning and grief that make the mind
And so on.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
A study for Bacterial Infection in Acute Diarrhea Patients
...Show More Authors

500 samples of diarrhea stool were collected from different ages(less than 1year –upto30years) and for both genders from some patients in (Alwiya hospital for children, Al-kendi, central health public laboratory and some gavernarated labs) period(1/11/2009—1/10/2010). Kinds of bacteria and parasites agents were isolated and identified from patients with diarrhea. Nine species of gram negative bacteria from enterobacteriaceae were isolated, E. coli isolated are the higher ratio 4.8% of all, then Salmonella typhi4.6% while the lowest ratios is Citrobacterfreundii 0.4%, while the other identified species were be among the previous rotios. also Plesomonasshigelloides was isolated which concedride one of the bacterial local studies.many met

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 17 2021
Journal Name
International Journal Of Knowledge Management
Assessing the Success of the Perceived Usefulness for Knowledge Management Systems
...Show More Authors

Recently, Knowledge Management Systems (KMS) consider one of the major fields of study in educational institutions, caused by the necessity to identify their knowledge value and success. Hence, based on the updated DeLone and McLean’s Information Systems Success Model (DMISSM), this study set out to assess the success of the Perceived Usefulness of Knowledge Management Systems (PUKMS) in Iraqi universities. To achieve this objective, the quantitative method is selected as the research design. In total, 421 university administration staff members from 13 Iraqi private universities were conducted. This study highlights a number of significant results depending on structural equation modeling which confirms that system, information, and s

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
The concept of sohba when the Golden Imam Through his books
...Show More Authors

Scientists were interested in the statement of the concept of companions and the definition of the companion in terms of his status or his novel or inherent to the Prophet of Allah (peace be upon him) and was for those who did not walk in the translations and the abundant share in this work, and among these scientists Hafiz Shams al-Din al-Dhahabi, which was translated to the companions His books, indicating their status and effort, and who had a novel of them - what we will see in the folds of the research, God willing -

View Publication Preview PDF
Publication Date
Wed Jun 29 2022
Journal Name
College Of Islamic Sciences
From the flags of The Koofic Grammar: Abdullah Al-Tuaal (243A.H)
...Show More Authors

    This research has tackled a scientific figure belongs to Koofi grammatical school. He is Abdullah Al-Tuaal who has occupied the fourth layer among the Koofi grammarians. There was a confusion between him and another Koofi grammarian from the same layer (Mohammed Bin Qaadim) in some old references. This research has clarified this confusion to affirm that they are two different grammarians.This research also tackles the scientific status of Al-Tuaal and the grammatical views that have been ascribed to him in addition to the analysis and discussion of these views. All this in the light of what has been mentioned in grammar books about the issues in which these views were stated.

View Publication Preview PDF
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of College Of Education
Recognition the Arabic Characters Based on the Characteristics of Arabic Language
...Show More Authors

Publication Date
Thu Nov 01 2018
Journal Name
International Journal Of Computing And Digital Systems
The Perception of Information Security Threats Surrounding the Cloud Computing Environment
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Sat Mar 30 2013
Journal Name
College Of Islamic Sciences
 The choices of Ibn Muqasim (354 AH) from the Qur’anic readings
...Show More Authors

This research examines aspects of Imam Al-Qurtubi's efforts in matters related to the topics of faith that he dealt with in his interpretation (the provisions of the provisions of the Qur’an); and it has been shown that Imam Al-Qurtubi in most of the doctrinal issues dealt with in his interpretation approximates the doctrine of the Sunnis of Ash'aris, Maturids and people of impact. He had responses to some of the teams, such as stereoscopic, karami, and Mu'tazilite, reinforcing the responses with transfer and mental evidence.
    It was found that Imam Al-Qurtubi says that there is an increase in faith and a decrease in it, that the increase is through actions (so obedience increases and decreases in sin) and that the

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Engineering
Evaluation The Performance Geodetic of the Receivers Using Static Positioning Technique
...Show More Authors

Global Navigation Satellite System (GNSS) is considered to be one of the most crucial tools for different applications, i.e. transportation, geographic information systems, mobile satellite communications, and others. Without a doubt, the GNSS has been widely employed for different scientific applications, such as land surveying, mapping, and precise monitoring for huge structures, etc. Thus, an intense competitive has appeared between companies which produce geodetic GNSS hardware devices to meet all the requirements of GNSS communities. This study aims to assess the performance of different GNSS receivers to provide reliable positions. In this study, three different receivers, which are produced by different manufacturers, were fi

... Show More
View Publication
Crossref
Publication Date
Mon Sep 30 2013
Journal Name
International Journal Of Network Security & Its Applications
Evaluating the Performance of the Secure Block Permutation Image Steganography Algorithm
...Show More Authors

Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding

... Show More
View Publication Preview PDF
Crossref