Preferred Language
Articles
/
jcois-333
Hadith of Shaaban: Modern study
...Show More Authors

In the name of God the Merciful
After .....
This is discussed in the hadeeth of Shaaban's speech, in which there is much talk in modern terms about the ruling
It has to be corrected, improved, weakened or denied, and it has a title (modern)
Shaaban's sermon is a modern study). It is an attempt to judge me after I come
In the text and then came out of the books and works that mentioned the sermon in its verses and then a statement of the ruling
And then I studied the rules and ruled them according to the rules
Followed by the scientists wound and amendment, and then the conclusion and deposited the most important results that came out
He accepts this purely for his generous consideration of this humble research, and then indexes the sources and references that I have returned to, and I ask God to

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
History Of Medicine
Study of the quality of attach algae to the concrete supports of some bridges within Baghdad city
...Show More Authors

A study of taxonomic quality of algae attaching Three concert bridges built on the Tigris River within city of Baghdad including Al-Jadriyah Bridge in Al-Jadriyah area and the Bab Al-Mu'adam Bridge in Al-Shalajiya area, while the third site included Al-Muthanna Bridge in north of Baghdad city, for the period from Autumn 2021 and Winter 2022. The study identified 114 species of 32 Genus in which the predominance of Bacillariophceae (74 species, 14 Genus) Followed by Cyanophyceae (30species, 12 Genus) and 10 species (6 Genus) of Chlorophyceae. The study showed an increase in species of Bacillariophceae, Cyanophyceae which has the ability to secretion gelatinous substances that enable it to stick to solid stand, the number of the larges

... Show More
Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Reviews In Medical Microbiology
Molecular study of some virulence genes of Pseudomonas aeruginosa isolated from different infections in hospitals of Baghdad
...Show More Authors

One hundred isolates of Pseudomonas aeruginosa were obtained from patients admitted to Baghdad hospitals, Iraq during the period between May 2018 until July 2018. These isolates were distributed as 15 isolates from blood, 25 isolates from urinary tract infections, 10 isolates from sputum, 12 isolates from wounds, 15 isolates from ear infections, 15 isolates from bronchial wash of patients suffering from respiratory tract infections in addition to 8 isolates from cystic fibrosis patients. The isolates were initially identified by culturing on MacConkey agar, blood agar and P. aeruginosa agar then diagnosed by performing some morphological and biochemical tests. The second diagnosis was done by API 20E system followed by Vitek 2 compact syste

... Show More
View Publication
Scopus (12)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sun May 19 2024
Journal Name
Basrah Journal Of Agricultural Sciences
Investigation on Field Performance of Plowing and Harvesting Potatoes in Southern Baghdad
...Show More Authors

This field experiment, was conducted to investigate a comparison of two methods for harvesting potatoes: mechanical and handy when using moldboard and chisel plow for primary tillage and three different distances for planting tubers in the rows 15, 25, and 35 cm in silt clay loam soil south of Baghdad. The factorial experiment followed a randomized complete block design with three replications using L.S.D. 5 % and 1 %. Mechanical harvest recorded the best valid potato tubers at 88.78 %, marketable yield of 31.74 ton. ha-1, efficiency lifted 95.68 %, tubers damage index 28.41, speeding up the harvesting process and reducing time and effort. Handy harvest gave the least damage to potato tubers, 6.02 %, and unlifted potato tubers, 4.32 %. Howe

... Show More
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of The College Of Education For Women
Al-arbaeen Al-boldniy for Ibin Asker Historical Study
...Show More Authors

Fortieth book is IbnAssaker mechanisms of modern books authored attention appeared amenable to the Messenger of Allah's will (Fife da upon h-d) in his emotional tempting scientists say despite his weakness and preached it save forty Hadith of year necessitated intercession and entering heaven eh Fife FA scientists 1940s h.g. Gae updated combines forty Hadith on a particular topic, authored destinations differed and collected and compiled, the first item in the 1940s that Abdul Rahman Abdullah ibn al-mubaarakmarvzishaikAssaker promised more than thirty workbook in this kind of composition topics varied between consolidation and conversations prove the Almighty Barry qualities, conversations provisions, worship, preaching, and of them only

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Photovoltaic system DC series arc fault: a case study
...Show More Authors

<p>Photovoltaic (PV) systems are becoming increasingly popular; however, arc faults on the direct current (DC) side are becoming more widespread as a result of the effects of aging as well as the trend toward higher DC voltage levels, posing severe risk to human safety and system stability. The parallel arc faults present higher level of current as compared with the series arc faults, making it more difficult to spot the series arc. In this paper and for the aim of condition monitoring, the features of a DC series arc fault are analyzed by analysing the arc features, performing model’s simulation in PSCAD, and carrying out experimental studies. Various arc models are simulated and investigated; for low current arcs, the heur

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Thu Sep 01 2022
Journal Name
مجلة الأستاذ للعلوم الإنسانية والاجتماعية
Impoliteness in Some American Presidential Debates: A Pragmatic Study
...Show More Authors

The current research is concerned with a pragmatic study of attack and defense acts that are used by President Donald Trump in the American Presidential Debate in 2020. Attack is an attempt to harm or defeat someone, and it is a bold message that the speaker or attacker does not like or disagree with the other antagonist. On the contrary, defense means a person responds to an attack of his or her opponent. After an attack, the politician either negates or fact-checks claims made by his opponents or tries to set the record straight. By the end of the study, it is expected to answer the following questions: What are the most frequent strategies of attack and defense that utilized by President Trump to formulate his speech? What are the reason

... Show More
Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Plant Archives
Taxonomical study for the species volkameria inermis l. (lamiaceae)
...Show More Authors

Publication Date
Wed May 01 2024
Journal Name
Journal Of Madenat Alelem College
Study 1,4- Naphthoquinone Derivative and Biological Activity: A Review
...Show More Authors

In this work, we focused on studying 1,4-naphthoquinones and their derivatives, and knowing the methods of preparing them using different auxiliary agents and forming derivatives containing heterocyclic rings, active groups and saturated rings containing heterogeneous elements . In addition, due to their strong antibacterial, antifungal and anticancer activity, 1,4-naphthoquinone compounds biological importance and are considered a source of various pharmaceutical compounds.

Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Dec 22 2024
Journal Name
Journal Of Petroleum Research And Studies
Optimizing Well Placement with Genetic Algorithms: A Case Study
...Show More Authors

Maximizing the net present value (NPV) of oil field development is heavily dependent on optimizing well placement. The traditional approach entails the use of expert intuition to design well configurations and locations, followed by economic analysis and reservoir simulation to determine the most effective plan. However, this approach often proves inadequate due to the complexity and nonlinearity of reservoirs. In recent years, computational techniques have been developed to optimize well placement by defining decision variables (such as well coordinates), objective functions (such as NPV or cumulative oil production), and constraints. This paper presents a study on the use of genetic algorithms for well placement optimization, a ty

... Show More
View Publication
Crossref