Preferred Language
Articles
/
jcois-2046
Sfaxi's guidance to alqira'at in "Ghaith al-Nafe fi alqira'at alsabe" From Surat Al-An'am to the end of Surat Hud
...Show More Authors

The research deals with the collection of Allamah Ali al-Nuri’s guidance on readings, which he included in his book (Ghaith al-Naf’ fi al-Qira’at al-Sabe) and singled out it in a separate study, commenting on what needs to be commented and a statement of his guidance, and it consists of an introduction, and three chapters, the first: for the translation of Allamah Sfaxi, and the second: To define the science of guidance, its origins and authorship, and the third: to mention the readings that Al-Safaqi drew from Surat Al-An’am to the end of Surat Hud, followed by the conclusion of the research, then the index of sources and references, and I followed the inductive-analytical method in the research.

Among his most important results: the diversity of his directives, including linguistic, grammatical, morphological, moral, formal, and so on, and his care in guiding readings with other sciences such as the science of endowment and the beginning, and his statement of the rule of endowment on the words he directs, and that he may direct the reading agreed upon by all readers, for the benefit of wanting to clarify it.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 01 2019
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Bulk binding approach for PMIPv6 protocol to reduce handoff latency in IoT
...Show More Authors

<p>Mobility management protocols are very essential in the new research area of Internet of Things (IoT) as the static attributes of nodes are no longer dominant in the current environment. Proxy MIPv6 (PMIPv6) protocol is a network-based mobility management protocol, where the mobility process is relied on the network entities, named, Mobile Access Gateways (MAGs) and Local Mobility Anchor (LMA). PMIPv6 is considered as the most suitable mobility protocol for WSN as it relieves the sensor nodes from participating in the mobility signaling. However, in PMIPv6, a separate signaling is required for each mobile node (MN) registration, which may increase the network signaling overhead and lead to increase the total handoff latency

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Sep 25 2024
Journal Name
Dentistry 3000
Maximum mouth opening measurement in relation to maximum bite force among children
...Show More Authors

Objective: This research aimed to study the relation between maximal bite force (MBF) and maximum mouth opening among 12-year-old school children. Methods: In this cross-sectional study, a total of 400 children aged 12 years (194 boys and 206 girls) were examined. The MBF for the right and left side, as well as the anterior region, were evaluated for all children. The MMO was measured using an electronic digital caliper. To analyze the data path analysis method was used. Results: Boys showed a higher MMO of 48.797 ± 6.500 than girls (46.710 ± 5.926 mm). The MMO increased with increasing MBF, with significant differences between females and males. Conclusion: The MMO was higher in boys than in girls. Gender plays a significant ro

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Jun 22 2020
Journal Name
Baghdad Science Journal
Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems
...Show More Authors

            In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Dec 11 2019
Journal Name
Aip Conference Proceedings
Quantization approach to steganography perceptual color spaces
...Show More Authors

In this study, we present a new steganography method depend on quantizing the perceptual color spaces bands. Four perceptual color spaces are used to test the new method which is HSL, HSV, Lab and Luv, where different algorithms to calculate the last two-color spaces are used. The results reveal the validity of this method as a steganoic method and analysis for the effects of quantization and stegano process on the quality of the cover image and the quality of the perceptual color spaces bands are presented.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Target cost tool to achieve competitive advantage
...Show More Authors

Target costing is one of the modern techniques in strategic Management accounting, Is has shown active adoption to changes in current business environments, In addition, is has seen a growth in strategic approach, The goal of using target costing is to build and strengthen competition abilities of economic units through introducing appropriate ways to decrease cost values while maintaining and improving quality of product, So this study is aim to show how can  economic units use target costing to achieve competitive advantages .

 

View Publication Preview PDF
Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Jordanian economy and ways to advance it
...Show More Authors

عند إطلالتنا على هذا البلد العربي لابد من التقصي ولو بعجاله عن اقتصاده وهو الاهم باعتبار ان الاقتصاد هو شريان الحياة لأي أمة فلا غنى ولا تهاون في نفس الوقت عن هذا الجانب المهم الذي يرتبط مدى تطوره بتطور البلد وهذا الاخير مرتبط بما متوفر لديه من موارد بشريه ومادية وان تفاوتت النسبة بينها فلا ضير في ذلك فالاهم هو وجود الموجه والمخطط بالاتجاه الصحيح نحو الاستغلال الامثل لهذه الموارد
(وان قلّتْ) وبالتالي

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 30 2008
Journal Name
College Of Islamic Sciences
Luqman's commandments to his son: Objective study
...Show More Authors

God  urged to read the Holy Qur’an and to ponder it is commanded, and the Most High said:  That they ponder over His verses and that those with insights remember ().
And this book that God Almighty sent down to the heart of His Prophet, peace and blessings be upon him, is as clear as the sun and the moon.
It is a book of guidance and the constitution of a nation that is the best nation brought forth for mankind, and God has taken care of its preservation as He said:  We have sent down the Remembrance, and we are its guardians.
This has been chosen for this topic (Luqman's commandments to his son) for what we see today in our time and society from the loss of morals and values and the neglect of parents to their chi

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of Hyperstructures
HYPER STRUCTURE THEORY APPLIED TO KU-ALGEBRAS
...Show More Authors

In this paper, the concept of a hyper structure KU-algebra is introduced and some related properties are investigated. Also, some types of hyper KU-algebras are studied and the relationship between them is stated. Then a hyper KU-ideal of a hyper structure KU-algebra is studied and a few properties are obtained. Furthermore, the notion of a homomorphism is discussed.

Publication Date
Wed Oct 18 2023
Journal Name
Iraqi National Journal Of Nursing Specialties
Barriers to Dietary Compliance among Diabetic Patients
...Show More Authors

The aim of the study is to identify the barriers to dietary compliance among diabetic patients.
Methodology: The sample of the study consist of 100 patients who were divided into two groups according to
the type of diabetes mellitus; type 1 (Insulin-dependent diabetic mellitus), and type n (Non-Insulin dependent
diabetes mellitus). Each group consists of 50 patient selected randomly at each visit to Al-Waffa center in Mosul
city during the period from (1-12-2005) to (1-2-2006).
The steps of the study include recording the different barriers for diabetic patients. The questionnaire
was used and special list was utilized for such purpose.
Results: The results shows that there were some barriers most common such as both

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Using Bernoulli Equation to Solve Burger's Equation
...Show More Authors

In this paper we find the exact solution of Burger's equation after reducing it to Bernoulli equation. We compare this solution with that given by Kaya where he used Adomian decomposition method, the solution given by chakrone where he used the Variation iteration method (VIM)and the solution given by Eq(5)in the paper of M. Javidi. We notice that our solution is better than their solutions.

View Publication Preview PDF
Crossref