Preferred Language
Articles
/
jcois-403
The semantics of terms in terms of inclusiveness when Imam Ibn Hajar al-Askalani (d. 852 e) in his book Fath al-Bari: Door of worship - Practical models
...Show More Authors

Praise be to Allaah.
My research has included the following: The field of application of semantics when fundamentalists are the book and the Sunnah. Imam Ibn Hajar agreed with the majority of fundamentalists that what is meant from the year (one word denotes one side on two things onwards), and agreed that the significance of the year specific to the rest of its members is not a definite and definite formulas of the public has the singular known as (the) Astragharism, and the plural known as ( The nationality stating that dumping, pluralism is defined as (add), and nakra, if it occurs in the context of the condition, denial and prohibition, the names of the condition, the connected names, and the word (all - all). And the year in which the particular is intended.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Study the Efficiency of Two Concentrations from Algae Cladophora glomerata Extract on the Giardia lamblia parasite
...Show More Authors

Giardia lamblia parasite was isolated from the diarrhea samples of patients with Giardiasis dysentery and was developed in HSP media, four mice groups have been used to find in vivo efficacy of two concentrations (128,256) mg/ml of chlorophorm extracts from Cladophora glomerata algae against Giardia lamblia parasite  as compared with (Flagyl) by measuring several biochemical markers as ( GPT and GOT) enzymes ,sodium ,potassium and iron concentration as well as counting the number of parasitic cysts in each mice groups. The results demonstrate that levels of GPTA GOT enzymes have been decreased in mice treated with algal extract. As for the concentration of the Sodium, Potassium and Iron increased in mice treat

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jul 22 2019
Journal Name
Arab Science Heritage Journal
رضي الدين ابن طاووس وآثاره العلمية
...Show More Authors

يعدّ رضي الدين ابن طاووس من أفاضل العلماء الذين برزوا من بيت آل طاووس،
الذين افادوا الثقافة العربية الإسلامية 

View Publication Preview PDF
Publication Date
Tue Jan 29 2019
Journal Name
Arab Science Heritage Journal
منهج البحث العلمي عندالحسن ابن الهيثم
...Show More Authors

وهوعبارة عن طائفة من القواعد المصوغة من اجل الوصول الى الحقيقة في العلم.وهو قبل كل شيء اسلوب منطقي وعملية ذهنية تتلازمان لكل عملية تحليل ترتدي الطابع العلمي .

View Publication Preview PDF
Publication Date
Wed May 05 2021
Journal Name
Arab Science Heritage Journal
الحياة العلمية والثقافية للمؤلف ابن نقطة
...Show More Authors

Ibn Nuqtah belongs to the Hanbali school of thought, which belongs to
Imam Ahmad Ibn Hanbal (D. 241 AH / 855 CE), and with his Iraqi
upbringing, he is Hijazi in essence and intent, as he belongs to the Maliki

View Publication Preview PDF
Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Reflections informational monitoring in Creative marketing systems
...Show More Authors

Abstract:                                                                                                      

         The research aims to measure the impact of infor

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2007
Journal Name
Journal Of The College Of Languages (jcl)
L’alternance codique ou le code switching dans l’échange verbal
...Show More Authors

Le mot anglais code switching ou l’équivalent français alternance codique est un terme très utilisé dans des recherches qui traitent des problèmes en sociolinguistique. Le bilingue dispose, dans son répertoire linguistique, de moyens de communication qui lui permettent d’adapter son langage à des situations de communication plus variées que ceux du monolingue. Le code-switching ou l’alternance codique qui est un lieu de structuration de stratégies de communication en est un moyen indispensable.
L’alternance codique dans la conversation est l’utilisation d’un mot ou plus appartenant à une langue B à l’intérieur d’une phrase qui appartient à une langue A. Dans la plupart des cas, le locuteur se sert de l’a

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of Education Program on Secondary School Teachers Psycho-Social Changes with Menopause in Baghdad City
...Show More Authors

Objective: To assess the effect of education program on psychological and social changes of secondary school teachers with menopause.

Method: A quasi-experimental design is carried out with the application of a pre- post –test for menopause secondary school teacher's bio-psychosocial changes. Non-probability sample consists of (60 female teachers) (40) teachers from Al- Rusafa first Education Directorate secondary schools, and (20) teachers from Al- Karkh third Education Directorate secondary schools. The sample was exposed to pretest, educational program, and posttest. Data were collected through the utilization of the study instrument (the questionnaire) and application of bio-psychosocial ed

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 16 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Security and confidentiality of information and its impact on the competitive performance of insurance companies: A prospective study for the Iraq insurance company and ALhamraa Insurance company (private)
...Show More Authors

The security of information represent the available  protection of  information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential  and controlling basis to protect individuals and companies from the damages. To insure the security  and confidentiality of information there are delicate,  proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
College Of Islamic Sciences
Judge's Preaching to the Litigants and Witnesses An Applied Doctrinal Study on Judicial Decisions of Saudi Courts
...Show More Authors

Abstract

Praise be to Allah and prayers and peace be upon our Prophet, Muhammad, his family and all of his companions,

This research addresses the issue of judge's preaching to the litigants and witnesses; it is a very significant issue since the judge cannot know the insides and facts, but it issues judgments based on the hearings. Since people are originally wrong-doing and ignorant, they, therefore, commit injustice, oppression, false adversarial, and false testimony. However, some people can possibly retreat and return to the right, after being inattentive or recalcitrant, by preaching. This fact led scholars to talk about the judge's preaching to litigant and witnesses and this research is conducted

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Cyber security technology and the reflection of its application on the quality of financial reports: An exploratory study of a sample of internal and external auditors
...Show More Authors

Abstract

                 This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an

... Show More
View Publication Preview PDF