Preferred Language
Articles
/
jcois-388
The absurdity of Orientalist thought and its deviation in interpretation Quranic text View and critique
...Show More Authors

The absurdity of Orientalist thought and its deviation in interpretation
Quranic text
View and critique

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jul 01 2016
Journal Name
Al–bahith Al–a'alami
The Color and its Semiotic Reflections in Iraqi Newspapers.
...Show More Authors

The Colour is one of important aspect of human activity, especially in General arts and press, and also is one of the essential elements to achieve and build the idea of design technology in the appropriate places, according to the space of designs work.
In a view of the colour and its relationship with the Semiotics, we can find that the objectives goals at the point of visual formats that’s «oral or written”. In last years, the intellectual concerns of Semiotics through eye contact methods, that’s meaning contact methods for get messages of sense of sight.
The semiotics term Can be defined into: (the sequential feature or network system has relations according agreed language rules, in a particular environment, also is a g

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The paradise in surat al-rahman and its preparation
...Show More Authors

Our life is a test and the eternal life in the afterlife. So we must work well in our life even win paradise, must always remember the death and there is a life after this death and we will be responsible for everything we've done in our life. God did not create us vain but for reward, punishment, for this we must have to well prepare for this great day and we have to think about what to do in order to win the paradise.
Keywords: paradise, surat al-rahman, preparation.

View Publication Preview PDF
Publication Date
Tue Sep 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Private investment and its role in the process of economic reform in Iraq
...Show More Authors

بعد ثورة تموز عام 1958في العراق, لم يكن يسمح للقطاع الخاص بأن تكون له استثمارات كبيرة في القطاعات الاقتصادية. وذلك بسبب الإيديولوجيات التي كانت تؤطر الفكر السياسي. حيث كان النهج الاشتراكي هو الغالب في إدارة الأنشطة الاقتصادية. إذ قامت الدولة بتأميم معظم الاستثمارات الخاصة الكبيرة ،لاس

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Interpretation of Mud Losses in Carbonates Based on Cuttings Description, Well-Logging, Seismic and Coherency Data
...Show More Authors

    Hartha Formation is an overburdened horizon in the X-oilfield which generates a lot of Non-Productive Time (NPT) associated with drilling mud losses. This study has been conducted to investigate the loss events in this formation as well as to provide geological interpretations based on datasets from nine wells in this field of interest. The interpretation was based on different analyses including wireline logs, cuttings descriptions, image logs, and analog data. Seismic and coherency data were also used to formulate the geological interpretations and calibrate that with the loss events of the Hartha Fm.

   The results revealed that the upper part of the Hartha Fm. was identified as an interval capable of creating potentia

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 30 2015
Journal Name
College Of Islamic Sciences
Structural and contextual dimensions of the coming   Intervals Between that diluted and her experience
...Show More Authors

In the name of of Allah the Merciful
Praise be to Allah, Lord of the Worlds, and prayers and peace be upon the Seal of the Prophets and Messengers. The envoy is a mercy to the worlds Muhammad Sadiq Al - Amin, and to the pure and good companions of the Tayyibites.
The formula of the morphological formulas, which have diverged from other meanings, whether lexicon or contextual and what this formula contains many meanings (effective source) and (effective in the sense of effective) and (effective sense reactor) and (effective sense) and ( (F) in the sense of a similar character) and ((the name of the) (collect). This was dealt with in the formula in Surat al-Nisaa a gramophone study. As mentioned in the study of the morphological subj

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 03 2016
Journal Name
Journal Of Educational And Psychological Researches
Professional competencies and teaching university professor from the point of view of students
...Show More Authors

Targeted Search:

-scale preparation of teaching and professional competencies required for university professor from the perspective of students from different disciplines.

-scale application prepared by the researcher for the students to see how their preference for these competencies to their professors.

-limited Search: Find determined to present the following

-students of both sexes in the University of Baghdad.

2013 -      2012

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 23 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Impact of self-assessment on income and sales tax collections from the point of view of income tax auditors in Jordan
...Show More Authors

This study aimed to show the extent of compliance with the income taxpayer  to provide tax returns and increase the speed of collection of these taxes in addition to increasing confidence in  Income Tax department and reduce the number of cases transferred to the courts and promote taxpayer awareness in charge of the importance of system self-assessment, and study sought to investigate the effect of the existence of records documents, technical audit, and computational audit and documentary audit on income tax collections in Jordan, from the point of view of Jordanian income tax auditors ,results shows there's a strong  relation between these variables and Income Tax collections.

View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Al–bahith Al–a'alami
The Diversity of Cultures and Ideologies in Society and its Impact on the Structure of Iraqi press
...Show More Authors

The diversity of cultures is still the title of an Iraqi specificity that gave the society a diversity and this is reflected in the journalistic reality with the changing of the political system generate a new political and ideological life that differs from what is prevailed during the decades. However, its exacerbation of the degree of division is an additional duty for the press as a cultural platform and a knowledge bridge that contributes to the process of dialogue, addressing the differences, establishing a politically homogeneous structure through the state and socially by uniting all components of society and working to raise public awareness of the importance of national belonging to build a modern state. Cultural diversity is a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF