Preferred Language
Articles
/
mhaMd4cBVTCNdQwCbFPU
A topology on a ring part of is-algebra
...Show More Authors

Scopus Clarivate
Publication Date
Tue Oct 11 2022
Journal Name
College Of Islamic Sciences
The effects of stubbornness is understood in the Holy Qur’an
...Show More Authors

Stubbornness is of the nature of the mean, we do not see it in the character of a person whose heart God filled with faith, wisdom and knowledge. And stubbornness does not fall into it except hearts that are arrogant, envious and objectionable, hearts that do not admit mistakes, and are not satisfied with the truth. Rather, you see humiliation,humiliation and shortcomings in returning to Him. He loves corruption * Except in humiliation, humiliation and shortcomings, the stubborn fall, even if they are proud when it is said to him, "Beware of God", pride takes him for sin, so his count is Hell, and his misery.

 

traces of stubbornness    :key wor

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 11 2022
Journal Name
College Of Islamic Sciences
Directing Grammarians for Grammatical Dispute To Interpret and Explain the fourth part of the Holy Qur’an
...Show More Authors

 

Abstract

 The miraculous of al-Quran has been surrounded by the attention of scholars, as it is the one that has astonished the rhetoricians with its eloquence. So , they paid attention to every part of it  and hugely they studied it with accuracy in respect to its Surah  ad Ayahs.   It is considered the most important source from which Arab scholars and early grammarians drew, given their unanimity that it is the highest degree of eloquence and the best record of the common literary language.

 

Among these sciences is the science of Grammar, and without Qur’an, this science would not have emerged, which later had control over every science of Arabic

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 12 2020
Journal Name
Al-kindy College Medical Journal
A Brief view on the pediatric COVID- 19 pandemic
...Show More Authors

The world is currently challenging the serious effects of the pandemic of the Coronavirus disease (COVID-19) caused by severe acute respiratory syndrome Coronavirus 2 (SARS-CoV-2). Data on pediatric COVID are rare and scattered in the literature. In this article, we presented the updated knowledge on the pediatric COVID-19 from different aspects. We hope it will increase the awareness of the pediatricians and health care professionals on this pandemic.

View Publication Preview PDF
Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
A Review on Models for Evaluating Rock Petrophysical Properties
...Show More Authors

The evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 30 2021
Journal Name
College Of Islamic Sciences
Controls Scanning on the slippers: a study fiqhiat Comparison
...Show More Authors

 

 

Controls Scanning on the slippers a study fiqhiat Comparison

The subject of this research is an important topic, which is frequently repeated, and people need to know its wisdom, and has made it in front and the preface and three detectives, showed through discussion the meaning of the survey on the socks, its wisdom, its rules and conditions, and the duration of the survey on it, spoiled and reasoned and compared to the doctrinal doctrines, And the most correct statement of words I have concluded with a number of things, as follows:

  1. The need to ensure that the slippers are clean, visible and inwa

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
A note on an –module with -pure intersection property
...Show More Authors

Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.

View Publication Preview PDF
Crossref
Publication Date
Tue Jun 23 2015
Journal Name
Journal Of Intelligent & Fuzzy Systems
A note on “separation axioms in fuzzy bitopological spaces”
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Dec 31 2023
Journal Name
International Journal On Technical And Physical Problems Of Engineering
A Multiple System Biometric System Based on ECG Data
...Show More Authors

A Multiple System Biometric System Based on ECG Data

Scopus
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref