Preferred Language
Articles
/
jcois-1027
Divine orders Divine orders directed to his prophets (peace be upon them): Divine orders directed to his prophets (peace be upon them)
...Show More Authors

 

ملخص البحث:

    ان الله تعالى هو الذي خلق جميع المخلوقات ، والذي بيده الموت والحياة وان كل هذه المخلوقات تحتاج الى اوامر ، وهذه الاوامر الالهية وجهها الله لعبادة بوساطة انبياءه ( عليهم السلام) فكانوا هم اول المستسلمين والمنقادين لأوامره ، فجاءت الآيات الكريمة مخاطبة للأنبياء واقوامهم بشكل عام ولنبينا محمد (r) بشكل خاص.

اما عن المضمون البحثي فقد جاءت مادته مقسمة الى ثلاثة مباحث تسبقها مقدمة وتتلوها خاتمة تضمنت اهم النتائج التي توصلت اليها في هذه الدراسة ومن ثم اوردت قائمة المصادر والمراجع فتضمن المبحث الاول مطلبين:

المطلب الاول: الامر بالعبادة لله تعالى مخاطباً النبي محمد (r).

المطلب الثاني : الامر بعبادة الله تعالى مخاطباً النبي عيسى (u).

اما المبحث الثاني : تضمن مطلبين : المطلب الاول : الامر بالدخول في الاسلام مخاطباً النبي محمد (r) ، والمطلب الثاني : الامر بالدخول في الاسلام مخاطباً النبي نوح (u).

اما البحث الثالث، فقد تضمن الامر باتباع العدل والاستقامة وكان على مطلبين
المطلب الاول : امر النبي محمد (r) بالاستجابة لكل الاوامر.

المطلب الثاني : امر النبي (r) باتباع العدل والاستقامة.

الخاتمة:

المصادر والمراجع

 

ملخص البحث:

    ان الله تعالى هو الذي خلق جميع المخلوقات ، والذي بيده الموت والحياة وان كل هذه المخلوقات تحتاج الى اوامر ، وهذه الاوامر الالهية وجهها الله لعبادة بوساطة انبياءه ( عليهم السلام) فكانوا هم اول المستسلمين والمنقادين لأوامره ، فجاءت الآيات الكريمة مخاطبة للأنبياء واقوامهم بشكل عام ولنبينا محمد (r) بشكل خاص.

اما عن المضمون البحثي فقد جاءت مادته مقسمة الى ثلاثة مباحث تسبقها مقدمة وتتلوها خاتمة تضمنت اهم النتائج التي توصلت اليها في هذه الدراسة ومن ثم اوردت قائمة المصادر والمراجع فتضمن المبحث الاول مطلبين:

المطلب الاول: الامر بالعبادة لله تعالى مخاطباً النبي محمد (r).

المطلب الثاني : الامر بعبادة الله تعالى مخاطباً النبي عيسى (u).

اما المبحث الثاني : تضمن مطلبين : المطلب الاول : الامر بالدخول في الاسلام مخاطباً النبي محمد (r) ، والمطلب الثاني : الامر بالدخول في الاسلام مخاطباً النبي نوح (u).

اما البحث الثالث، فقد تضمن الامر باتباع العدل والاستقامة وكان على مطلبين
المطلب الاول : امر النبي محمد (r) بالاستجابة لكل الاوامر.

المطلب الثاني : امر النبي (r) باتباع العدل والاستقامة.

الخاتمة:

المصادر والمراجعر

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
A realistic vision of the ration card system in Iraq for the duration (1997-2003) and (2017-2003)
...Show More Authors

Abstract:

The researcher shed light on a diet in Iraq before 2003 became in this period. And how the ration card has a variety of vocabulary and cover the need of the population of commodities and have a key role in saving Iraq from a real crisis in the period of economic siege, especially in light of the State's direction to support the agricultural sector, which in that period able to fill half of the market needs of food the basic. As well as providing strategic storage at the Ministry of Commerce enough for six months But after the events of 2003 and the crises that hit the country and the unstable security situation began to rise voices calling for reform of the ration card system as a system that is a burden on the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
الاهمية الاقتصادية للموانىء الحرة مع الاشارة الى المنطقة الاقتصادية الحرة المقترحة في ميناء الفاو
...Show More Authors

الاهمية الاقتصادية للموانىء الحرة مع الاشارة الى المنطقة الاقتصادية الحرة المقترحة في ميناء الفاو

View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
استهداف السعر كأساس لتحقيق تقنية التكلفة المستهدفة للوحدات الاقتصادية العاملة في بيئة الأعمال الحديثة
...Show More Authors

المقدمة

تمثل الأسعار تعبيرا" نقدياً لقيمة السلع والخدمات المقدمة للزبون، وتعد عملية التسعير من العمليات المهمة وذات الأثر البالغ على نجاح واستمرار منظمات الأعمال، نظراً لما لها من تأثير على المقدرة الربحية وإعادة توزيع الدخل القومي المخصص للاستهلاك، إذ أنه بتحديد الأسعار يستطيع الفرد أن يوزع دخله بين ما يعده ضرورياً من السلع وما يعد كمالياً.

وعموماً فإن لعملية التسعير م

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2023
Journal Name
مجلة دراسات دولية
الذكاء الاصطناعي والوجود الإنساني: قراءة فكرية في الابعاد الاجتماعية
...Show More Authors

Preview PDF
Publication Date
Sat Jun 25 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The impact of the cash flow statement indicators in market value change of the industrial firms listed on the Palestine Stock Exchange
...Show More Authors

This research aims to examine the ability of impact of the cash flow statement indicators in the change in the market value of the industrial firms listed on the Palestine Stock Exchange. The research population consisted of (13) firms during the period (2015-2020). Data were collected from the annual financial statements of the firms. The research relies on the Pooled effects model to analyze the cross-section data (Panel Data), and the multiple regression method to test the hypotheses. The research finds a positive significant impact of (the ratios of cash flows from operating activities to sales, the return on assets from operating cash flows, and cash flows from operating activities to total current liabilities) in the change

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 01 2026
Journal Name
Lark
استقصاء تمييز ونطق طلبة الكليات العراقيين متعلمي اللغة الإنكليزية لغة اجنبية لتسلسلات الأصوات الإنكليزية الصحيحة Investigating the Iraqi EFL Students’ Recognition and Production of English Consonant Sequences
...Show More Authors

English allows for consonant sequences at the beginning of words, which poses a challenge for speakers of other languages, especially those whose native languages do not contain such sequences, such as Arabic. Therefore, this study aims to investigate students’ recognition and production of initial consecutive consonants in relation to gender, and the significance of the statistical differences between students in recognition and pronunciation of consecutive consonants. Consequently, a cohort of fifty-two Iraqi college students (18 males and 34 females) were selected as a sample. A multiple-choice test of two phases was used as a research instrument. The results showed that females outperformed males in recognizing and producing c

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Analysing Iraqi Railways Network by Applying Specific Criteria Using the GIS Techniques
...Show More Authors

The railways network is one of the huge infrastructure projects. Therefore, dealing with these projects such as analyzing and developing should be done using appropriate tools, i.e. GIS tools. Because, traditional methods will consume resources, time, money and the results maybe not accurate. In this research, the train stations in all of Iraq’s provinces were studied and analyzed using network analysis, which is one of the most powerful techniques within GIS. A free trial copy of ArcGIS®10.2 software was used in this research in order to achieve the aim of this study. The analysis of current train stations has been done depending on the road network, because people used roads to reach those train stations. The data layers for this st

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Iraqi Journal Of Physics
Bandwidth Improvement of a Cone-Inverted Cylindrical and Cross Hybrids Dielectric Resonator Antennas
...Show More Authors

In this work, two cone-inverted cylindrical and cross-hybrid dielectric resonator antennas are stacked and excited by the coaxial probe method with an operating standard resonant frequency of 5.438 GHz. A drawback of these standard Dielectric Resonator Antennas (DRAs) is their narrow bandwidth. For good antenna performance, a stacked DR geometry and a thick dielectric substrate having a low dielectric constant are desired since this provides large bandwidth, better radiation power, reduces conductor loss and nonappearance of surface waves. Many approaches, such as changing the shape of the dielectric resonator, have been used to enhance bandwidth. Using DRA, having the lowest dielectric constant, increases the bandwidth and the electroma

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref