Preferred Language
Articles
/
jcois-602
Cognitive dimensions For grammar work at Sibweh In light of the data of the speech
...Show More Authors

The Arabic grammatical theory is characterized by the characteristics that distinguish it from other languages. It is based on the following equation: In its entirety a homogeneous linguistic system that blends with the social nature of the Arab, his beliefs, and his culture.
    This means that this theory was born naturally, after the labor of maintaining an integrated inheritance, starting with its legal text (the Koran), and ends with its features of multiple attributes.
Saber was carrying the founding crucible of that theory, which takes over from his teacher, Hebron, to be built on what it has reached. It is redundant to point to his location and the status of his book.
So came to my research tagged: (cognitive dimensions of the grammar work at Sibuyh), to get closer to the majestic construction set up by Sibuyh, to recognize those knowledge frameworks, and scientific foci.
Volgett issue of the foundations of knowledge at Sibawayh, and discussed the consideration of grammar and belief, and limped on the concept of grammar, and then separated to say in the fact of the grammar factor, and the related interpretation, rejection, and acceptance.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 15 2019
Journal Name
Spe Middle East Oil And Gas Show And Conference
Evaluation of the Potentials for Adapting the Multistage Hydraulic Fracturing Technology in Tight Carbonate Reservoir
...Show More Authors
Abstract<p>Hydraulic fracturing is considered to be a vital cornerstone in decision making of unconventional reservoirs. With an increasing level of development of unconventional reservoirs, many questions have arisen regarding enhancing production performance of tight carbonate reservoirs, especially the evaluation of the potential for adapting multistage hydraulic fracturing technology in tight carbonate reservoirs to attain an economic revenue.</p><p>In this paper we present a feasibility study of multistage fractured horizontal well in typical tight carbonate reservoirs covering different values of permeability. We show that NPV is the suitable objective function for deciding on the optimum number</p> ... Show More
Scopus (31)
Crossref (24)
Scopus Crossref
Publication Date
Sat Jul 18 2020
Journal Name
College Of Islamic Sciences
ال ظاهرة اللجوء في ضوء العقيدة الاسلامية
...Show More Authors

البحث معني بظاهرة اللجوء من العالم الاسلامي الى العالم الغربي وما يحيط بهذه الظاهرة من تحديات سواء كانت سلبية او ايجابية والبحث يوضح احكام العقيدة الاسلامية للحكم على هذه الظاهرة التي اصبحت من النوازل في هذا العصر 

View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Incidence of intestinal parasitic infections among random samples at Al- Aziziyah hospital in Wasit province/Iraq
...Show More Authors

                  

     The study is designed to identify intestinal parasitic infections examined at Al-Aziziyah Hospital in Wasit Governorate in Iraq. In this study, a total of (460) internal and external patients were monitored for intestinal parasitic infections. All stool samples were analyzed by the direct method (microscopic exam.) to discover the trophozoite stages and cyst stages for intestinal protozoan parasites. The most incidence parasites in different sex, area residence and different age groups. Out of (460) patient sample were infected with 217 at a percentage of (47.17%), 101(46.5%) were for males and 116 (53.5%) were for females. It was found that the numbers and percentages of a single (one

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Nov 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Biological Effect of Different Concentrations of Bacillus Thurngensis Isolated From The Soils of Sawa Lake, Al Muthanna Governorate on The of Hypera postica at Different Time Periods
...Show More Authors
Abstract<p>This study conduct in Al-Muthanna governorate to assess five concentrations of <italic>Bacillus</italic> thurngensisagonist <italic>Hyperapostica</italic>. The results showed the presence of <italic>Bacillus thurngensisin</italic> all the studied sites of Lake Sawa in Muthanna Governorate, and the rates of its presence were close to the same sites, and the rate of its presence in those sites was 35%, and its highest rate was recorded in the north and east of the lake, as it reached 40% and the lowest amounted to 30% in the two sites south and west site. The results of the study showed that five concentrations were taken from bacterial isolates of <it></it></p> ... Show More
View Publication
Scopus Crossref
Publication Date
Thu Jun 29 2017
Journal Name
College Of Islamic Sciences
The prohibition of cheating in the Sunnah of the Prophet
...Show More Authors

In The Name of Allah Most Gracious Most Merciful

Cheating is one of the forbidden actions and reprehensible morals that are forbidden by Islamic law, because it involves an assault on rights, whether they are the rights of God Almighty or the rights of God.

people, or self-rights, and because it involves harming others.

Since the Sunnah of the Prophet is the second source of Islamic law, many of the noble hadiths of the Prophet forbid and prohibit cheating.

This study sheds light on it.

View Publication Preview PDF
Publication Date
Fri Jan 19 2024
Journal Name
Research Journal Of Pharmacy And Technology
Cutoff Point Measurement of the waist circumference for the diagnosis of Metabolic Syndrome in Iraqi university students
...Show More Authors

Background: Metabolic syndrome (MetS) is a collection of connected cardiovascular risk factors that characterizes the complicated illness. The waist circumference cutoff point fluctuation has so far defined Mets. Objective: This study aimed to determine the cutoff point for WC in healthy Iraqi adults. Methods: This cross-sectional survey establishes the standard value for WC among 300 healthy university students in Wasit city, Iraq. They are aged between 18-25 years. The receiver operator characteristic (ROC) curve was used WC to predict the presence of two or more risk factors for MetS, as defined by IDF. Results: The cutoff level yielding maximum sensitivity and specificity for predicting the presence of multiple risk factors was

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
The cluster analysis of most important citrus trees in some governorates of Iraq for the year 2019
...Show More Authors

Citrus fruits are one of the consumer agricultural products of the Iraqi citizen. It is rich in vitamins and usedin many food industries as well as medicines. Classifying the amount of production of citrus treesaccording to the producing governorates has been done to find a map that shows the production of citrustrees according to Iraqi governorates. A cluster analysis method was used according to the hierarchicalmethod. The results showed that Najaf and Qadisiyah are the most similar in citrus production, whileSaladin and Najaf were the two governorates with the furthest distance in proximity matrix. Diyalagovernorate was clustered in the first cluster within two, three, four or five of the clusters for classifyingIraqi governorates covere

... Show More
Scopus (2)
Scopus
Publication Date
Sat May 01 2021
Journal Name
Journal Of Engineering
A Prediction Formula for The Estimation of Sediment Load in The Upper Reach of Al-Gharraf River
...Show More Authors

The presence of deposition in the river decreases the river flow capability's efficiency due to the absence of maintenance along the river. In This research, a new formula to evaluate the sediment capacity in the upstream part of Al-Gharraf River will be developed. The current study reach lies in Wasit province with a distance equal to 58 km. The selected reach of the river was divided into thirteen stations. At each station, the suspended load and the bedload were collected from the river during a sampling period extended from February 2019 till July 2019. The samples were examined in the laboratory with a different set of sample tests. The formula was developed using data of ten stations, and the other three s

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 02 2012
Journal Name
Baghdad Science Journal
Morphological study of pollen-grains for the wild species of the genus Erysimum L. (Crucifereae) in Iraq
...Show More Authors

Pollen grains morphology have been studied for the wild species of the genus Erysimum L. which belong to Crucifereae family in Iraq. These species are E. filifolium Boiss. et Hausskn., E. oleifolium J. Gay, E. repandum L., E. eginense Hausskn. ex Bornm., E. aucheranum J. Gay, E. cheiranthoides L., E. alpestre Ky. ex Boiss., E. kurdicum Boiss. et Hausskn., E. tenellum DC., E. strophades Boiss., E. gladiiferum Boiss. et Hausskn., E. nasturtioides Boiss. et Hausskn. The study was performe by using light microscope . The study reveal that there was only one type of pollen grain named Tricoplate in all studied species . The study also demonstrated that there were differences among pollen grains morphology . The species E. kurdicum , E. alpestre

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More