Preferred Language
Articles
/
jcois-971
Need and transgression in Surat (Abs) Semantic grammatical study: Need and transgression in Surat (Abs)
...Show More Authors

      The research aims to highlight the significance and composition and the diversity of meanings and the Quranic context in the necessary and transgressive verbs in Surat (Abs).

      This research consists of : a preamble , and two studies . The researcher addressed in the preliminary the importance of the phenomenon of necessity and infringement, the signs of the necessary action , the structure and controls of the act , the methods of infringement , its sections and signs.

      As for the first topic : The researcher addressed the necessary verbs in Surat Abs , an applied study in terms of grammatical structure , semantic lexical and explanatory study , the Qur'anic context and Quranic readings .

      As for the second topic : the researcher addressed the transitive verbs in Surat (Abs) an applied study in terms of syntactic syntax , semantic lexical and explanatory study , the Qur'anic context , Quranic readings and come up with useful results .

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Apr 15 2016
Journal Name
International Journal Of Computer Applications
Hybrid Techniques based Speech Recognition
...Show More Authors

Information processing has an important application which is speech recognition. In this paper, a two hybrid techniques have been presented. The first one is a 3-level hybrid of Stationary Wavelet Transform (S) and Discrete Wavelet Transform (W) and the second one is a 3-level hybrid of Discrete Wavelet Transform (W) and Multi-wavelet Transforms (M). To choose the best 3-level hybrid in each technique, a comparison according to five factors has been implemented and the best results are WWS, WWW, and MWM. Speech recognition is performed on WWS, WWW, and MWM using Euclidean distance (Ecl) and Dynamic Time Warping (DTW). The match performance is (98%) using DTW in MWM, while in the WWS and WWW are (74%) and (78%) respectively, but when using (

... Show More
View Publication
Crossref
Publication Date
Tue Oct 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Estimating of Survival Function under Type One Censoring Sample for Mixture Distribution
...Show More Authors

In this article, it is interesting to estimate and derive the three parameters which contain two scales parameters and one shape parameter of a new mixture distribution for the singly type one censored data which is the branch of right censored sample. Then to define some special mathematical and statistical properties for this new mixture distribution which is considered one of the continuous distributions characterized by its flexibility. Next,  using maximum likelihood estimator method for singly type one censored data based on the Newton-Raphson matrix procedure to find and estimate values of these three parameter by utilizing the real data taken from the National Center for Research and Treatment of Hematology/University of Mus

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 29 2014
Journal Name
International Journal Of Academic Research In Progressive Education And Development
The Effects of Problem-Based Learning on Self-Directed Learning Skills among Physics Undergraduates
...Show More Authors

The aim of this study is to compare the effects of three methods: problem-based learning (PBL), PBL with lecture method, and conventional teaching on self-directed learning skills among physics undergraduates. The actual sample size comprises of 122 students, who were selected randomly from the Physics Department, College of Education in Iraq. In this study, the pre- and post-test were done and the instruments were administered to the students for data collection. The data was analyzed and statistical results rejected null hypothesis of this study. This study revealed that there are no signifigant differences between PBL and PBL with lecture method, thus the PBL without or with lecture method enhances the self-directed learning skills bette

... Show More
Publication Date
Wed Apr 25 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Coclosed Rickart Modules
...Show More Authors

   Let  be a right module over an arbitrary ring  with identity and  . In this work, the coclosed rickart modules as a generalization of  rickart  modules is given. We say  a module  over   coclosed rickart if for each ,   is a coclosed submodule of  . Basic results over this paper are introduced and connections between these modules and otherwise notions are investigated.

 

View Publication Preview PDF
Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Iranian Journal Of Materials Science And Engineering
First-Principles Analysis of Cr-Doped SrTiO3 Perovskite as Optoelectronic Materials
...Show More Authors

The influence of Cr3+ doping on the ground state properties of SrTiO3 perovskite was evaluated using GGA-PBE approximation. Computational modeling results infered an agreement with the previously published literature. The modification of electronic structure and optical properties due to Cr3+ introducing into SrTiO3 were investigated. Structural parameters assumed that Cr3+ doping alters the electronic structures of SrTiO3 by shifting the conduction band through lower energies for the Sr and Ti sites. Besides, results showed that the band gap was reduced by approximately 50% when presenting one Cr3+ atom into the SrTiO3 system and particularly positioned at Sr sites. Interestingly, substituting Ti site by Cr3+ led to eliminating the band ga

... Show More
Scopus (4)
Scopus Clarivate
Publication Date
Mon Feb 18 2019
Journal Name
Iraqi Journal Of Physics
Elastic transverse electron scattering form factors of 11Li exotic nucleus
...Show More Authors

        The elastic transverse electron scattering form factors have been studied for the 11Li   nucleus using the Two- Frequency Shell Model (TFSM) approach. The single-particle wave functions of harmonic-oscillator (HO) potential are used with two different oscillator parameters bcore and bhalo. According to this model, the core nucleons of 9Li nucleus are assumed to move in the model space of spsdpf. The outer halo (2-neutron) in 11Li is assumed to move in the pure 1p1/2, 1d5/2, 2s1/2 orbit. The shell model calculations are carried ou

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Robust M Estimate With Cubic Smoothing Splines For Time-Varying Coefficient Model For Balance Longitudinal Data
...Show More Authors

In this research، a comparison has been made between the robust estimators of (M) for the Cubic Smoothing Splines technique، to avoid the problem of abnormality in data or contamination of error، and the traditional estimation method of Cubic Smoothing Splines technique by using two criteria of differentiation which are (MADE، WASE) for different sample sizes and disparity levels to estimate the chronologically different coefficients functions for the balanced longitudinal data which are characterized by observations obtained through (n) from the independent subjects، each one of them is measured repeatedly by group of  specific time points (m)،since the frequent measurements within the subjects are almost connected an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Efficient Algorithm for Fuzzy Linear Fractional Programming Problems via Ranking Function
...Show More Authors

In many applications such as production, planning, the decision maker is important in optimizing an objective function that has fuzzy ratio two functions which can be handed using fuzzy fractional programming problem technique. A special class of optimization technique named fuzzy fractional programming problem is considered in this work when the coefficients of objective function are fuzzy. New ranking function is proposed and used to convert the data of the fuzzy fractional programming problem from fuzzy number to crisp number so that the shortcoming when treating the original fuzzy problem can be avoided. Here a novel ranking function approach of ordinary fuzzy numbers is adopted for ranking of triangular fuzzy numbers with simpler an

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Journal Of Engineering
3D- ABAQUS Modelling of Prestressed Concrete Hunched Beams with Multi-Openings of Different Shapes
...Show More Authors

A long-span Prestressed Concrete Hunched Beam with Multi-Opening has been developed as an alternative to steel structural elements. The commercial finite element package ABAQUS/CAE version 2019 has been utilized. This article has presented the results of three-dimensional numerical simulations investigating the flexural behaviour of existing experimental work of supported Prestressed Concrete Hunched Beams with multiple openings of varying shapes under static monotonic loads. Insertion openings in such a beam lead to concentrate stresses at the corners of these openings; as a result, extensive cracking would appear. Correlation between numerical models and empirical work has also been discussed regarding load displacemen

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
2013 Sixth International Conference On Developments In Esystems Engineering
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref