Preferred Language
Articles
/
jcopolicy-624
Doctrinal monotheistic modeling of religion: the impact of the political aspect on Islamic sources and books
...Show More Authors

There are Islamic sources and books that deal with the different doctrinal and differential framework of the Islamic religion with a monistic approach, describing them with embarrassing jurisprudential titles such as: excommunication and expiation, and epithets that carry the characteristics of hatred and rejection, in addition to removing them from the sect and religion, and the reason for that is that the doctrine (A) or (b) considers itself the doctrine that represents only the Islamic religion, and other doctrines are misguided and disbelieving. the reasons behind this - besides the attempt to establish doctrinal and fiqih rooting in claiming truth and escaping from within the foundational differential doctrinal system – is the political aspect which has had and is still a great influence on the rise of the trend of modeling In the Arab and Islamic world since the inception of sects; where the political authority and circles supporting them have become sectarian biased. The authority believes that it provides it with advocacy in the face of its opponents from other sects, and that this authority provides support to advocates of doctrines and their theorists, which provided an exclusive doctrinal environment consisting of hundreds of sources. Those sources and books within the framework of the Islamic system are the research attempt to diagnose the disease of sectarianism resulting from the monolithic reading of the Islamic religion, and treat it because of its great negative impact on citizenship and peaceful civil coexistence between the people of the same country, and between countries as well, especially since the feature of diversity is prominent in Arab Islamic societies. So, doctrines and teams must re-read each other in a way that provide a permanent climate of coexistence unaffected by the concerned political aspects.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Construction And Building Materials
Utilization of magnetic water in cementitious adhesive for near-surface mounted CFRP strengthening system
...Show More Authors

Cement-based adhesive (CBA) is used as a bonding agent in Carbon Fibre Reinforced Polymer (CFRP) applications as an alternative to epoxy-based adhesive due to the drawbacks of the epoxy system under severe service conditions which negatively affect the bond between the CFRP and strengthened elements. This paper reports the results of, an investigation carried out to develop two types of CBA using magnetized water (MW) for mixing and curing. Two magnetic devices (MD-I and MD-II), with different magnetic field strengths (9000 and 6000 Gauss) respectively, were employed for water magnetization. Different water flows with different water circulation times in the magnetizer were used for each device. Compressive and splitting tensile strength te

... Show More
Scopus (12)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2017
Journal Name
Journal Of Craniofacial Surgery
Lateral Ridge Splitting (Expansion) With Immediate Placement of Endosseous Dental Implant Using Piezoelectric Device
...Show More Authors

View Publication
Crossref (17)
Crossref
Publication Date
Sun Dec 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
Oxidative status among a group of pregnant women in relation to gingival health condition
...Show More Authors

Background: pregnancy as a systemic condition causes changes in the functioning of human body as a whole and specifically in the oral cavity and it also is considered as a stressful condition. These changes may favor the increase of oxidative stress. Aim: The aim of this study was to estimate the level of marker of oxidative stress (malondialdehyde) and antioxidant (uric acid) in saliva of pregnant compared to non-pregnant women and to assess the gingival health condition in both groups. Additionally, unstimulated salivary flow rate was determined in both groups. Subjects, materials and methods: The study group consisted of sixty pregnant women, they were divided into three equal groups according to trimester (20 pregnant women for each

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Crossref
Publication Date
Tue Aug 30 2022
Journal Name
Research Journal Of Pharmacy And Technology
Status of HBeAg in association with other baseline tests in Iraqi patients with CHB
...Show More Authors

Chronic Hepatitis B(CHB) is a serious sequel after Hepatitis B Virus infection, although the rate of chronicity is inverse with age but it may be associated with a significant proportion of deaths related to cirrhosis and liver cancer. HBV serology and measurement of hepatocytic enzymes with viral load can predict disease prognosis and response to treatment. HBeAg refers to a high viral replication and associated with more infectivity to others. This study aimed to determine the impact of HBeAg status in chronically infected patients on various baseline tests. A total of 90 patients with CHB infection who were included in this study. Several standardized measures used for liver function tests, viral load and hepatitis B serological

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Applied Biology & Biotechnology
Field treatment of three wheat varieties with Trichoderma harzianum bioagent to control Anguina tritici
...Show More Authors

View Publication
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Journal Of Bridge Engineering
Experimental Investigation of Curved-Soffit RC Bridge Girders Strengthened in Flexure Using CFRP Composites
...Show More Authors

View Publication
Crossref (12)
Crossref
Publication Date
Sun Jul 24 2022
Journal Name
Healthcare
Incidence of Gingival Black Triangles following Treatment with Fixed Orthodontic Appliance: A Systematic Review
...Show More Authors

This systematic review aimed to investigate the relation between orthodontic treatment (OT) and the incidence of the gingival black triangle (GBT) after completing treatment with a fixed orthodontic appliance, as well as the associated risk factors and the level of alveolar bone. Electronic and hand searches were conducted in three electronic databases for relevant articles published up to March 2022. Retrieved articles went through a two-step screening procedure, and the risk of bias (RoB) was assessed by the Joanna Briggs Institute checklists. The incidence of GBT after OT was set as the primary outcome, while the secondary outcomes were the risk factors associated with GBT and alveolar bone loss following OT. Out of 421 papers, 5

... Show More
View Publication
Scopus (18)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Sat Apr 25 2020
Journal Name
Asian Journal Of Agriculture And Biology
Biodegradation of plastic wastes by confused flour beetle Tribolium confusum Jacquelin du Val larvae
...Show More Authors

View Publication
Scopus (17)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Sun Dec 06 2015
Journal Name
Baghdad Science Journal
Energy Calculation for Excited Lithium Atom in Position Space
...Show More Authors

The energy expectation values for Li and Li-like ions ( , and ) have been calculated and examined within the ground state and the excited state in position space. The partitioning technique of Hartree-Fock (H-F) has been used for existing wave functions.

View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref