Preferred Language
Articles
/
jcoeduw-415
KHalaf Alhmar and what we get from his poem
...Show More Authors

KHalaf Alhmar and what we get from his poem

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Plant Archives
The effect of adding some organic and mineral substances to calcareous soil on adsorption and desorption of copper and its removal efficiency from soil
...Show More Authors

Scopus (5)
Scopus
Publication Date
Wed Jun 18 2014
Journal Name
Geological Quarterly
Stable carbon and nitrogen isotopes and elemental composition and origin of organic matter from the Euphrates, Injana and Dibdibba formations in Iraq: discrimination between marine and terrestrial environments
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Wed Jun 29 2022
Journal Name
College Of Islamic Sciences
The Ash'aris and their position on faith, An Ideological Study: الايمان
...Show More Authors

 

The Ash'aris and their position on faith, An Ideological Study

Omed AbdulQader rasool               

College of Islamic Sciences/Salahaddin University-Erbil

Abstract

The concept of faith is very complex, and there are a lot of talk about it among the major Islamic groups such as the Kharijites, the Mu'tazila, the Jahmiyya and others, because of its great importance, and the worldly and eschatological effects it entails according to the elements of faith such as recognition, ratification and action.

The researcher chose one sect, which is the

... Show More
View Publication Preview PDF
Publication Date
Wed May 24 2023
Journal Name
College Of Islamic Sciences
Analyzing the likeness of fundamentalists and examples of its jurisprudential applications
...Show More Authors

The new events in every era are endless, and it is not required of the legal texts to pursue each event by itself and attach to it its ruling.
At the same time, every event or action must have a Shari’a ruling according to the wise Lawgiver, and our scholars have noted this in every event presented to them. ...etc.
It is well known that reaching the legal ruling on a matter, by examining the detailed evidence, is subject to following the path of the rules and regulations specific to the overall evidence, which we organize on the basis of the principles of jurisprudence.
Therefore, any disagreement about the manner or content of these rules will have an impact on the difference of jurists in partial issues, when examining the d

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 20 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ANTIMICROBIAL ACTIVITY OF EDIBLE FILM FROM WHEY PROTIEN ISOLATE INCORPORTED WITH GREEN TEA EXTRACT AND ITS USE IN CHEESE COATIN: ANTIMICROBIAL ACTIVITY OF EDIBLE FILM FROM WHEY PROTIEN ISOLATE INCORPORTED WITH GREEN TEA EXTRACT AND ITS USE IN CHEESE COATIN
...Show More Authors

The aim of the current research is to study the effect of adding green tea to the edible film prepared from the whey protein isolate on the effectiveness of microorganisms and evaluating the of antimicrobial effectiveness of these films on Iraqi soft cheese packaging during the nine days of storage as an alternative to commercial packaging. At the beginning of the study, the minimum inhibitory concentration was measured by calculate the diameter of the zone of inhibition on growth of the bacteria and it's included the group of Gram negative bacteria (Escherichia coli, Salmonella spp, Pseudomonas Aeruginosa) and the group of Gram positive bacteria (Staphylococcus Aureus, Bacillus spp) and a yeast (Candida Albican). Where the diameter of t

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
Parental Oral Violence against Their Teen- ager Children and its Relation with Some Variables: Parental Oral Violence against Their Teen- ager Children and its Relation with Some Variables
...Show More Authors

Abstract
The Verbal Violence that is directed towards sons is considered one of
the dehavioural problems that have negative reflections on the personality
of the individual . the increase in the frequency and intensity of that
behavior in the daily life may lead to psychological and behavioural
disturbances, and such behaviourhas to be stooped in an early time before it

leave negative affects on the personality of the teenager which will not be
cured or removed easily .
The family that is represented by the parents has a prominent effect In the
shaping of the teenager's personality , hence forth the normal teenage is
a reflection of a stable family life , relatively empty of disturbances and
unbalanc

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 15 2025
Journal Name
Al–bahith Al–a'alami
THE ISSUES OF YOUTH IN THE TALK SHOWS IN THE IRAQI SATELLITE CHANNELS:: (An Analytical Study of the Shabab wa Banat Program at Al-Sumaria TV Channel and of the Hala Shabab at Al-Iraqia TV Channel) (A Research Drawn from a Master’s Thesis)
...Show More Authors

The purpose of this research is to identify the youth issues in Talk Shows in the Iraqi satellite channels via monitoring a sample of episodes of the Talk Shows  episodes which are concerned and analyzed the youth issues in the Iraqi satellite channels, namely, «Hala Shabab Program» at Al-Iraqia satellite Channel and «Shabab wa Banat Program» at Al-Sumaria satellite Channel by recording and re-watching them again. This research is classified as one of descriptive researches. The survey method was adopted in this study.

For this purpose, the researcher prepared an analysis form. The researcher de

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 15 2025
Journal Name
Al–bahith Al–a'alami
US Policy Image Regarding the Middle East Region as Reported by the Iraqi Newspapers (An Analytical Study of the Public Opinion in Editorials: Al-Sabah, Al-Mashriq and Tariq Al-Shaab Papers Over the Period from 1st of July to 30th of September 2013)
...Show More Authors

The present study is an attempt to throw light on the nature of the US policy regarding the Middle East region as portrayed by AI-Sabah, Al-Mashriq and Tariq Al-Shaab papers over a period of three months from 1st of July to 30th of September 2013.

In writing this study, a number of goals have been set by the researcher. These goals may include but in no way limited to the nature of the US image as carried by the above three papers, the nature of the topics tackled by them and the nature of the Arab countries which received more and extensive coverage than others.

A qualitative research approach is proposed for the study. This approach has allowed the researcher to arrive at definite answers for the possible questions rais

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
T-Essentially Coretractable and Weakly T-Essentially Coretractable Modules
...Show More Authors

        A new generalizations of coretractable modules are introduced where a module  is called t-essentially (weakly t-essentially) coretractable if for all proper submodule  of , there exists f End( ), f( )=0 and Imf tes  (Im f + tes ). Some basic properties are studied and many relationships between these classes and other related one are presented.

View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref