Research objective: This research aims to unveil how to use the method of referral in understanding the Holy Quran.
The reason for choosing the research: The one that invited me to write on this topic is the importance of the referral method, so I liked the research in it, and unveiled this wonderful Qur’anic method, so that it helps to understand the intention of God Almighty in his dear book.
The research plan: The research was divided into three topics and a conclusion.
As for the first topic, it is divided into two requirements. The first requirement deals with the definition of referral language.
In the second requirement, the referral defined convention.
As for the second topic, it deals with the types of referral, and it is divided into two requirements. The first requirement is external referral (maqam). The second requirement is internal (textual) referral.
As for the third topic, it deals with examples of referral from the Holy Qur’an, Surat Al-Anam as a model, and it is divided into two requirements, the first requirement is the definition of Surat Al-Anam. And the second requirement, in which some applications of the referral method are mentioned in Surat Al-Anam.
The nature of this research is that it is a descriptive study that deals with the issue of abrogation in the Noble Qur’an by research and study, as it is one of the issues that have been and are still the subject of
Strategic decision making is considered one of the important processes for senior management in contemporary business organizations and service organizations due to the properties of the service such as intangibility, concomitance and mortality. Decision-making has three approaches according to the opinions of most of the writers and researchers in the administrative area: an analytical approach, intuitive approach and behavioral approach. This research is trying to discover the nature of the relationship in terms of the link between the impact of each of these approaches and efficiency of marketing services by selecting an intentional sample of 58 researches from the Directorate General of Traffic, one of the Iraqi Interior Ministry ins
... Show MoreTakbiratul Ehram "The First Takbeer to Start Prayer" means: the words that the worshiper says to start his prayers, and refrain from anything invalidates it. the findings revealed that the four school jurists agreed that the prayer is not valid without Takbiratul Ehram "The First Takbeer to Start Prayer", and they disagreed on its description, so the majority of jurists said that it is a pillar, and some of them called it an obligatory, but Hanafi made it a condition. Likewise, the four jurists agreed that the one who articulates Takbiratul Ehram "The First Takbeer to Start Prayer" with the word: “Allahu Akbar,”; his Takbeer is correct, and they disagreed about the one who adds a word, or replaced it with another, where the m
... Show MoreSince the beginning of the twentieth century, the art of composition has witnessed major transformations that accompanied the transformations that occurred in the cognitive field. The plastic artists rejected the prevailing artistic line, and sought to create a new artistic format that accommodates the new social and cultural problems. So was the announcement of the era of modernity in the late nineteenth century, with the birth of the impressionism movement that gave a place to challenge all that is familiar. . And he drew the attention of the researcher, and for that he chose the research title (Characteristics of Modernity in the Works of Saleh Al-Jumayyi (Analytical Study)) The researcher divided the research as follows:
Methodolo
Generally, statistical methods are used in various fields of science, especially in the research field, in which Statistical analysis is carried out by adopting several techniques, according to the nature of the study and its objectives. One of these techniques is building statistical models, which is done through regression models. This technique is considered one of the most important statistical methods for studying the relationship between a dependent variable, also called (the response variable) and the other variables, called covariate variables. This research describes the estimation of the partial linear regression model, as well as the estimation of the “missing at random” values (MAR). Regarding the
... Show MoreThree types of medical commercial creams Silvazine, Cinolon Tar and Hydroquinon Domina were incorporated in this study. The medical creams were taken directly and placed uniformly on the glass slide. Each type of pharmaceutical was weighed at 1 mg and dispersed on an area of 1x1 cm. This process ensures same thickness for all samples. The creams were analyzed by using double-beam UV/visible spectrophotometer Metertech SP8001. The absorption spectrum for each of samples was measured against wavelength range of 300–700 nm.
Diabetes mellitus type 2 (T2DM) formerly called non-insulin dependent diabetes mellitus (NIDDM) or adult-onset diabetes is a common disease. Rheumatoid factor is a well-established test used in the diagnosis and follows the prognosis of rheumatoid arthritis (RA). Rheumatoid factor is sometimes found in serum of patients with other diseases including diabetes mellitus (DM), due to the presence of pro-inflammatory cytokines such as TNF- α which play an important role in chronic inflammatory and autoimmune diseases like rheumatoid arthritis (RA). The aim of the study is to investigate the associations between type 2 diabetes mellitus (T2DM) and rheumatoid arthritis (RA) in scope of rheumatoid factor (RF), hyperglycemia a
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MorePropaganda speech in the Gulf press articles about the Qatari crisis, an analytical study in the political articles published in the newspapers (Riyadh) Saudi Arabia and (Al-Ittihad) UAE from 5/6/2017 to 5/9/2017, University of Baghdad, College of Media, Press Department, 2019. The problem of the research was to monitor the contents of propaganda messages to Saudi Arabia and the UAE regarding the Qatari crisis, especially with the escalation of propaganda media campaigns between the four boycotting countries on the one hand and Qatar on the other hand, in light of crises and conflicts in the Gulf region and the Arab region in general. The researcher used the survey method to answer the research questions and achieve its results. This res
... Show More