Preferred Language
Articles
/
lRfXYpIBVTCNdQwCVK6N
The makers of sedition in light of Chapters (Al-Baqarah and Yusuf)/An objective study
...Show More Authors

The makers of strife exist in every era and time. They differ in how these temptations are created and the methods used in doing so. In our modern era, they are more; This is due to the presence of information technology and its easy availability at their fingertips, as well as the spread of social networking sites, which are rapidly spreading among ignorant groups and groups that are deficient in their use. Which led the makers of sedition to exploit these matters and create various temptations and spread them among peoples and societies. Today, we cannot predict the future of humanity in light of this huge amount of temptation. What the Holy Qur’an mentioned about the types of temptations in its noble verses and their embodiment in several craftsmen was only mentioned in order to take a lesson from those verses and reflect on them Or imitate, to identify their creators, and to beware of similar examples wherever and whenever they exist. This is what we sought to prove and clarify by contemplating the verses of the Holy Qur’an regarding this topic. This is what the research concluded, which includes an introduction, two topics, and a conclusion. A prayer from God Almighty to protect us from the evil of temptations and the evil of their makers and to spare our countries and societies from their evils.

Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 20 2018
Journal Name
Al-academy
Spatial transformations and visual construction in the contemporary theater
...Show More Authors

The current research deals with the subject of spatial transformations and visual construction in contemporary theater. How the visual system works to create spatial diversity in the contemporary Iraqi theater performance and how visual construction contributes to a spatial development process capable of building a tourism system that creates an architectural architecture that leaves the topography of the scriptural architecture. And the production of various indications and patterns in the scene of theatrical presentation in order to produce the new foundational meaning by creating a new structure that leads to diversity and diversity in the visual system and the beginning of visual constructions and their applications. Knowledge and te

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Iraqi Journal Of Agricultural Sciences
Effect of magnetic field on the growth, multiplication and concentration of the volatile oil of rosemary officinalis in vitro
...Show More Authors

Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
An approximate solution for solving linear system of integral equation with application on "Stiff" problems
...Show More Authors

An approximate solution of the liner system of ntegral cquations fot both fredholm(SFIEs)and Volterra(SIES)types has been derived using taylor series expansion.The solusion is essentailly

View Publication Preview PDF
Publication Date
Mon Oct 10 2022
Journal Name
International Journal Of Mathematics In Operational Research
Modelling time-series process of an agricultural crop production process by EWMA quality control chart
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jun 30 2025
Journal Name
Scripta Medica
Case Report: A Rare Presentation of Sigmoid Volvulus During Pregnancy With an Integrative Postoperative Approach
...Show More Authors

View Publication Preview PDF
Publication Date
Mon Jul 10 2023
Journal Name
Journal Of Engineering
Uptake of Fluoride from Water Using Recycled Raw Beef Bone as an Environmently Freindly Waste
...Show More Authors

Excessive intake of fluoride, mainly through drinking water is a serious health hazard affecting humans worldwide. In this study, the defluoridation capacities of locally available raw waste beef bones have been estimated. Several experimental parameters including contact time, pH, bone dose, fluoride initial concentration, bone grains size, agitation rate, and the effect of co-existence of anions in actual samples of wastewater were studied for fluoride removal from aqueous solutions. Results indicated excellent fluoride removal effeciency up to 99.7% at fluoride initial concentration of 10 mg F/L and 120 min contact time. Maximum fluoride uptake was obtained at neutral pH range 6-7. Fluoride removal kinetic was well described by the ps

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Water, Air, & Soil Pollution
Decontamination of Cobalt-Polluted Soils Using an Enhanced Electro-kinetic Method, Employing Eco-friendly Conditions
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Sep 30 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Correlation of Penetration Rate with Drilling Parameters For an Iraqi Field Using Mud Logging Data
...Show More Authors

This paper provides an attempt for modeling rate of penetration (ROP) for an Iraqi oil field with aid of mud logging data. Data of Umm Radhuma formation was selected for this modeling. These data include weight on bit, rotary speed, flow rate and mud density. A statistical approach was applied on these data for improving rate of penetration modeling. As result, an empirical linear ROP model has been developed with good fitness when compared with actual data. Also, a nonlinear regression analysis of different forms was attempted, and the results showed that the power model has good predicting capability with respect to other forms.

View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Journal Of Oral And Maxillofacial Surgery, Medicine, And Pathology
Rhinocerebral mucormycosis: An Iraqi experience of 16 consecutive cases followed up for up ten years
...Show More Authors

View Publication
Scopus Clarivate Crossref