Preferred Language
Articles
/
jperc-1126
Awareness of Students at Imam Muhammad bin Saud Islamic University of the Requirements of Married Life in the Light of Social Changes and Methods of Deepening It in Accordance with an Islamic Educational Vision
...Show More Authors

This study aims to identify the level of students’ awareness at Imam Muhammad bin Saud University of the requirements of married life in the light of social changes and suggested methods to deepen this awareness (according to the Islamic educational vision) from their own perspective. In this study, the researcher used the descriptive approach with a survey research method, depending on questionnaires to collect data, which he applied to students of College of Sharia in Imam Muhammad bin Saud Islamic University, as well as, students in the fields of Sociology, Social Work, and Psychology in the College of Social Sciences. The findings of the study revealed that students are aware of the requirements of married life concerning mutual rights. In addition, female students are aware of the rights of both husband and wife. The level of awareness of the aforementioned is moderate; students have also shown a moderate level of awareness about dealing with matrimonial disputes. Female respondents are more aware than male respondents of the requirements of married life, the study has illustrated that there are no differences in awareness between married and unmarried students in this regard. Finally, the respondent’s field of study has no impact on the level of awareness of the requirements of married life. Moreover, this study indicated that the methods suggested deepening the awareness of students of the requirements of married life at Imam Muhammad bin Saud University in the light of social changes (in accordance with Islamic Education) from their own perspective have gained a moderate degree of approval.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 18 2019
Journal Name
Iraqi Journal Of Physics
Transition rates and microscopic effective charges for 16C exotic nucleus
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
DNA Encoding and STR Extraction for Anomaly Intrusion Detection Systems
...Show More Authors

View Publication
Scopus (9)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Thu Dec 15 2016
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
Building Words Dictionary List Using Symbol Enumeration and Hashing Methodology
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Advanced Pharmacy Education And Research
Comparative biosimilar quality studies between a rituximab product and MabThera
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri Oct 23 2020
Journal Name
International Journal Of Dentistry
Retention Protocols and Factors Affecting Retainer Choice among Iraqi Orthodontists
...Show More Authors

Background. To identify the most common retention protocols practiced by Iraqi orthodontists using a specially designed e-survey. Furthermore, this study aimed to assess the effect of sociodemographic factors on the participant’s choice. Methods. Two hundred and twenty-five questionnaires with 23 multiple choice questions were sent to members of the Iraqi Orthodontic Society. The questionnaire was organized into four sections representing information about sociodemographic status of the orthodontists, factors affecting the selection of the retention system, commonly used retainers in the upper arch and lower arch, and duration of the retention system. The chi-square test was used to test the significant association between differe

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Digital Image Watermarking Using Arnold Scrambling and Berkeley Wavelet Transform
...Show More Authors

Embedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.

View Publication Preview PDF
Publication Date
Mon Jul 01 2013
Journal Name
Journal Of Engineering
Water Hammer Arresters; Review Studies and Practical Experiments for Alternatives
...Show More Authors

The current research deals with practical studies that explain to the Iraqi consumer multiple instances about the phenomenon of water hammer which occur in the water pipeline operating with pressure. It concern a practical study of the characteristics of this phenomenon and economically harmful to the consumer the same time. Multiple pipe fittings are used aimed to reduce this phenomenon and its work as alternatives to the manufactured arresters that used to avoid water hammer in the sanitary installations, while the consumer did not have any knowledge as to the non-traded for many reasons, including the water pressure decreases in the networks and the use of consumer pumps to draw water directly from the network. Study found a numbe

... Show More
Publication Date
Wed Jul 02 2014
Journal Name
Journal Of The Faculty Of Medicine
Unintended durotomy during degenerative lumbar Spine surgery (Incidence and management
...Show More Authors

AW Tarik, AW Ali T, A Salah, Journal of faculity of medicine Baghdad university, 2014 - Cited by 3

View Publication
Publication Date
Sat Dec 30 2023
Journal Name
Wasit Journal For Pure Sciences
Honeywords Generation Technique based on Meerkat Clan Algorithm and WordNet
...Show More Authors

The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Agricultural And Statistical Sciences
ESTIMATED NON-PARAMETRIC AND SEMI-PARAMETRIC MODEL FOR LONGITUDINAL DATA
...Show More Authors

View Publication
Scopus