Preferred Language
Articles
/
jcoeduw-1301
Memorizing the Holy Quran and its Impact on Child's Language: سالم بن غرم الله بن محمد الزهراني/ جامعة ام القرى - السعودية
...Show More Authors

في هذا العصر - الذي داهمت في الأخطار لغة الفصاحة والبيان - يبقى القرآن الكريم أعظم حافظ للغة السليمة ، وأكبر معين لأهلها للحفاظ على ثرائها وبلاغتها ، فهي باقية ببقائه ما بقي الليل والنهار .

وهذا البحث يدور حول حفظ القرآن الكريم وأثره على لغة الطفل، ويتكون من مقدمة : وفيها بيان أهمية الموضوع ، وخطة البحث ، ومنهجه، وثلاثة مباحث:

المبحث الأول : فضل حفظ القرآن الكريم ، وفوائد حفظه إجمالاً ، والمبحث الثاني : أثر حفظ القرآن الكريم في لغة الطفل: ويتمثل في المظاهر الآتية :

- تذوق الكلام الجميل، - سلامة النطق وفصاحة اللسان، - سلامة الإعراب، - الثراء اللفظي وبلاغة التعبير، - إتقان القراءة والكتابة. والمبحث الثالث : خطوات عملية لتنشئة لغة الطفل بحفظ القرآن الكريم، ومنها : - التدرج في تعليم القرآن وحفظه، - التكرار والمراجعة ، - فهم الآيات وبيان ما فيها من الغريب ، ثم الخاتمة ، وفيها أهم النتائج ، وختاماً فهرس المصادر والمراجع .

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
The Iraqi Postgraduate Medical Journal
Acceptance of COVID19 Vaccines among Health Care Workers in Al Risafa Directorate of Health in Baghdad
...Show More Authors

View Publication Preview PDF
Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Sep 27 2020
Journal Name
Journal Of The College Of Education For Women
Textual Analysis of Complex Nominals Translation Errors in Economic Texts
...Show More Authors

The present study has three objectives: 1) to investigate the prevalence of complex nominals in economic discourse represented via the selected business news texts, 2) to shed some light on the most common translation errors made by second year students in the Department of Translation in rendering complex nominals into Arabic, and 3) to detect the possible causes behind such translation errors and suggest some translation tips which might sound helpful to the students of translation to find the most suitable translation equivalent. The present study is based on an empirical survey in which a selective analysis of someeconomic texts represented in business news texts is made. A corpus of 159 complex nominals was selected from seven busin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 30 2025
Journal Name
Methodsx
New Modifications of ADM with Applications in Kind of PDEs
...Show More Authors

This paper presents seven modified Adomian Decomposition Method (ADM) techniques for efficiently solving initial value problems, especially those involving non-homogeneous and nonlinear differential equations. While the classical ADM is effective for linear homogeneous cases, it has difficulties solving more complex problems. The proposed modifications—from MADM1 to MLADM—include Maclaurin and Taylor expansions, Laplace transforms, and single-step iterations.• These modifications enhance convergence, reduce complexity, and improve accuracy.• Each method offers specific advantages, such as accelerating convergence (MADM2, RADM4), simplifying computation (TSADM5), and achieving higher accuracy (MLADM).• Numerical examples confirm th

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Apr 28 2024
Journal Name
Journal Of Advances In Information Technology
Enhancement of Recommendation Engine Technique for Bug System Fixes
...Show More Authors

This study aims to develop a recommendation engine methodology to enhance the model’s effectiveness and efficiency. The proposed model is commonly used to assign or propose a limited number of developers with the required skills and expertise to address and resolve a bug report. Managing collections within bug repositories is the responsibility of software engineers in addressing specific defects. Identifying the optimal allocation of personnel to activities is challenging when dealing with software defects, which necessitates a substantial workforce of developers. Analyzing new scientific methodologies to enhance comprehension of the results is the purpose of this analysis. Additionally, developer priorities were discussed, especially th

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Engineering
Optimization of Hole Cleaning In Iraqi Directional Oil Wells
...Show More Authors

Efficient cuttings transport and hole cleaning are very important factors for obtaining an effective drilling operation. In an inclined and horizontal drilling, hole cleaning issue is a common and complex problem.

   The scope of this research is to study the drilling parameters which affect hole cleaning in Iraqi directional wells through studying and analyzing some drilled wells ( vertical , directional (30 degree) , directional (60 degree) and horizontal ).An excel sheet is prepared to calculate carrying capacity index which represents an indicator for good hole cleaning in different sections. The study indicated through the field investigations, practical experiences and theoretical calculations tha

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 30 2023
Journal Name
Iraqi Journal Of Science
Detection of mexB Multidrug Efflux Gene in Some Local Isolates of Pseudomonas aeruginosa
...Show More Authors

According to the prevalence of multidrug resistance bacteria, especially Pseudomonas aeruginosa, in which the essential mechanism of drug resistance is the ability to possess an efflux pump by which extrusion of antimicrobial agents usually occurs, this study aims to detect the presence of mexB multidrug efflux gene in some local isolates of this bacteria that show resistance towards three antibiotics, out of five. Sensitivity test to antibiotics was performed on all isolates by using meropenem (10μg/disc), imipenem (10μg/disc), amikacin (30 μg/disc), ciprofloxacin (5μg/disc) and ceftazidime (30 μg/disc). Conventional PCR results showed the presence of mexB gene (244bp) in four isolates out of ten (40%). In addition,25, 50μg/ml of cur

... Show More
Preview PDF
Publication Date
Tue Feb 28 2023
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Development prediction algorithm of vehicle travel time based traffic data
...Show More Authors

This work bases on encouraging a generous and conceivable estimation for modified an algorithm for vehicle travel times on a highway from the eliminated traffic information using set aside camera image groupings. The strategy for the assessment of vehicle travel times relies upon the distinctive verification of traffic state. The particular vehicle velocities are gotten from acknowledged vehicle positions in two persistent images by working out the distance covered all through elapsed past time doing mollification between the removed traffic flow data and cultivating a plan to unequivocally predict vehicle travel times. Erbil road data base is used to recognize road locales around road segments which are projected into the commended camera

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Jan 30 2013
Journal Name
Al-kindy College Medical Journal
Conservative Treatment of Closed Fracture Shaft Humerus in Adult Patients
...Show More Authors

Background: Fractures of the humeral shaft
accounting for approximately 3% of all
fractures. There is a wide array of good
options for their treatment and controversy
over the best methods. Although good
techniques of osteosynthesis are available, the
aim of this article is toemphasize on the benefit
and good outcome of conservative treatment
for properly selected cases to decrease the cost
and avoid the complications of surgery.

View Publication Preview PDF
Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
A New Three Step Iterative Method without Second Derivative for Solving Nonlinear Equations
...Show More Authors

In this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.

View Publication Preview PDF
Crossref