Preferred Language
Articles
/
IELYkJoBMeyNPGM3R86E
Analyzing the Pragmatics of Argumentation in the Arabic Novel Using Artificial Intelligence: An Applied Study on the Granada Trilogy
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Wed Mar 30 2022
Journal Name
College Of Islamic Sciences
What the linguists commented on, "I do not know" in the dictionary of Lisan al-Arab, a semantic study
...Show More Authors

Absitract

This research was interested in studying the phrase “I don’t know” in the Lisan al-Arab dictionary, and Lisan al-Arab was based on collecting its material from five dictionaries, including: Tahdhib al-Lugha, al-Muqamah, al-Sahih, and the footnotes of Ibn Berri, al-Nihaya and Gharib al-Hadith. The objection to this phrase, and the discussion of its various implications among linguists and the clarification of the closest and most famous content to it according to the data presented to the researcher in his research journey, and to reach this goal, the research division into a preface, five demands and a conclusion and followed the list of sources and references. To define the lexicon of Lisan al-Ar

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Biochemical & Cellular Archives
EVALUATION OF THE POTASSIUM AVAILABILITY IN THE SALINE SOILS USING THE TRADITIONAL CHEMICAL CRITERION
...Show More Authors

View Publication
Publication Date
Tue Feb 21 2017
Journal Name
Biomechanics And Modeling In Mechanobiology
A novel method for non-invasively detecting the severity and location of aortic aneurysms
...Show More Authors

The influence of an aortic aneurysm on blood flow waveforms is well established, but how to exploit this link for diagnostic purposes still remains challenging. This work uses a combination of experimental and computational modelling to study how aneurysms of various size affect the waveforms. Experimental studies are carried out on fusiform-type aneurysm models, and a comparison of results with those from a one-dimensional fluid–structure interaction model shows close agreement. Further mathematical analysis of these results allows the definition of several indicators that characterize the impact of an aneurysm on waveforms. These indicators are then further studied in a computational model of a systemic blood flow network. This demonstr

... Show More
View Publication Preview PDF
Scopus (34)
Crossref (33)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Plant Archives
STUDY OF THE EFFECT OF SPEED, DEPTH OF THE CULTIVATION AND THE NUMBER OF TIMES THE SPRING – LOADED CULTIVATOR PASSES ON SOME TECHNICAL PARAMETERS OF THE CULTIVATOR AND ON WEED CONTROL
...Show More Authors

Preview PDF
Publication Date
Fri Jan 15 2021
Journal Name
Plant Archives
STUDY OF THE EFFECT OF SPEED, DEPTH OF THE CULTIVATION AND THE NUMBER OF TIMES THE SPRING – LOADED CULTIVATOR PASSES ON SOME TECHNICAL PARAMETERS OF THE CULTIVATOR AND ON WEED CONTRO
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Desalination And Water Treatment
Combination of the artificial neural network and advection-dispersion equation for modeling of methylene blue dye removal from aqueous solution using olive stones as reactive bed
...Show More Authors

Scopus (15)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Wed Sep 30 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The added value of internal audit and its role in achieving independence and responsibility: applied research in the Rafidain State Company for Dams implementation
...Show More Authors

The added value of internal audit greatly contributes to adding value to the institution, but most departments of economic units in Iraq neglected the role of internal audit and the added value that can be achieved by those institutions, since the term added value of internal audit is a relatively vague term from the premise that what cannot be measured is difficult Determine it, and perhaps descriptive standards for it is the extent of compliance with international auditing standards (IIA).

The research aims to study the procedures and results of auditing to verify that they have given an added value to the audit with a positive impact, develop its aspects and research, identify deficiencies for the audi

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Educational And Psychological Researches
Mathematical-procedural Knowledge ant its relation to logical-mathematical intelligence among students at the third stage in mathematics department
...Show More Authors

Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Educational And Psychological Researches
Mathematical-procedural Knowledge ant its relation to logical-mathematical intelligence among students at the third stage in mathematics department
...Show More Authors

The study seeks the relationship between the mathematical-procedural Knowledge and the logical-mathematical intelligence among students at the third stage in mathematics department. To this end, three questions were arisen: what is the level of mathematical-procedural Knowledge among the third stage students in mathematics department regarding their gender? Do male or female students have more logical-mathematical intelligence and are there significant differences base on their gender? What kind of correlation is between the level of mathematical-procedural Knowledge and the logical-mathematical intelligence of male and female students in the third stage in the mathematics department? A sample of (75) male and female students at the thir

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More