Preferred Language
Articles
/
jcois-244
Abu Mijlaz Al-Basri and his approach to traditional interpretation
...Show More Authors

Research summary

 


This research discloses the study of the methodology of one of the notables of the followers, which is: (Abi Mijlis Al-Basri), who had a clear impact on many commentators after him, especially in the field of interpretation by impact. This study included two topics:

The first: his biography and scientific

The second: his methodology in the traditional interpretation.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 02 2012
Journal Name
Baghdad Science Journal
Bacterial contamination of AL-Habania and AL-Tharthar reservoirs
...Show More Authors

Bacterial contamination of AL-Habania and AL-Tharthar reservoirs were studied during the period from February 2001 to January 2002, samples were collected from four stations in AL-Habania reservoir (AL-Warrar, AL-Theban regulator, middle of the reservoir and the fourth was towards AL-Razzaza reservoir) and from two stations at AL-Tharthar reservoir (Ein AL-Hilwa and the middle of the reservoir). Coliform bacteria, faecal Coliforms, Streptococci, faecal Streptococci and total count of bacteria were used as parameters of bacterial contamination in waters of both reservoirs through calculating the most probable number. Highest count of Coliform bacteria (15000 cell/100ml) was recorded at Ein AL-Hilwa and lowest count at AL-Theban regulator

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Engineering
Hydraulic Characteristics and Discharge of Canal Sluice Gate: Practical Approach
...Show More Authors

Simplifying formulas that are used for calculations and design are the aim of researchers. For present work, the approach to distinguish the flow under sluice gate was conducted in a laboratory. The extensive experimental program was done to collect fifty-four data points for both free and submerged flow conditions. The data included different discharges, gate openings, flow depths at upstream as well as the flow depths represent a tail water and at a contracted section for downstream. The collected data are analyzed according to a problematic that may encounter in the field, to present a more straightforward (but with acceptable accurate) practical features equations and charts. Based on the proposed formulas, five meth

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (29)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Thu Sep 15 2022
Journal Name
Al-academy
The semiotic approach in analyzing contemporary graphic text
...Show More Authors

With a great diversity in the curriculum contemporary monetary and visions, and development that hit the graphic design field, it has become imperative for the workers in the contemporary design research and investigation in accordance with the intellectual treatises and methods of modern criticism, because the work design requires the designer and recipient both know the mechanics of tibographic text analysis in a heavy world of texts and images varied vocabulary and graphics, and designer on before anyone else manages the process of analysis to know what you offer others of shipments visual often of oriented intended from behind, what is meant, in the midst of this world, the curriculum Alsemiae directly overlap with such diverse offer

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Kinds of Food and Drinks in Morocco in the Period of Al-Murabteen and Al-Moahideen
...Show More Authors

Cooking was of great importance in the Islamic Arabic culture and the
people of Morocco have shown great interest in this aspect and also in the
variety in the making of food. They used all kinds of meat of and have shown
interest in preserving and distributing it .The people of Morocco used the
additives in their cooking such as salt, saffron and many other kinds to add
special flavor and taste and their cooking a distinctive flavor.
Sweet and pastry, in addition to the drinks, represented another aspect of the
Moroccan kitchen. At that time women were brought as slaves from Sudan
and as a result they brought their experience in the making of sweets and
pastry with them to Morocco, they used sugar, fat, wheat

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
A Semi-Supervised Machine Learning Approach Using K-Means Algorithm to Prevent Burst Header Packet Flooding Attack in Optical Burst Switching Network
...Show More Authors

Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 30 2021
Journal Name
College Of Islamic Sciences
Al-Hajjaj in pre-Islamic poetry hangs Imru 'al-Qays and the Twrfa of Ibn al-Abd as a model
...Show More Authors

The topic of (pilgrims) of the old and modern subjects at the same time, as it extends his foot and is associated with the beginning of speech and argument, a modern because it is based on studies and research (and the theory of pilgrims) from (Austin and Cyril) through (Charles Breman) to (Aristotle) ), It is worth mentioning here to mention the role of (Hazem al - Qartagni) in mentioning the value of the pilgrimage of hair and saying the use of persuasion in the hair, is palatable and acceptable. Hence our research applied these views, and we chose the pendants as a model for that matter.

View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Engineering
Structural Systems for Modern Architecture in Iraq Analysis Study to Dr. Qahtan Al-Madfa’i’s Architecture
...Show More Authors

Dr. Qahtan Al-Madfa’i’s architecture has been characterized by a particular characteristic that may be unique and extreme at the same time, that is the use of the distinctive three-dimensional structural coverings and the exploitation of structural construction to give an extra aesthetic touch to the composition of the building, to achieve the application of his universal ideas, which he strongly believed and defended.

      In the period of the marked urban decline that the country undergoes now, which urges us toward making a comparison between the beginning of the modern Iraqi architecture and its ascending path up to its peak and the periods of its decline until it reached a very

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 09 2022
Journal Name
مجلة كلية الاداب جامعة بغداد
Khadija Al-Hadith and her scientific role in Iraq
...Show More Authors

Khadija Al-Hadithi was known for her love of the Arabic language. She was a distinguished and serious phenomenon in Arabic science and culture. She was born in Basra Governorate, one of the ancient and important cities in the history of Arabic grammar and one of the centers of the intellectual and scientific movement. The Basra Grammar School emerged there and made numerous achievements in the field of Arabic linguistics that remain an important source for students of the specialty.