I started writing the research because of the linguistic and rhetorical methods in the Holy Quran.
This Sura included in all its verses the plural form such as the word planets graves and seas except the word sky was singular as the name of a genus, and this Sura showed the horrors of the Day of Judgment at the world level Included another science is the science of the interview and also came in the repetition and deletion and other linguistic and rhetorical things and concluded this Sura that the goal of breaking the sky and scattering planets and scatter graves is the human himself.
The Koran is a miracle immortal and science is still drawn from him each according to his specialty.
This study takes its importance in the area of systemic and historical
studies because it stands on presenting such aspects from the systematic
respect and now Ibn AL-Jouzy dealt with the text of this subject and how he
was exact in telling them.
Therefore, this study sheds light on the important aspects of this
method in his book through reading and studying such texts whether they had
direct or indirect relationship with this subject.
This study is not an easy task since it is based on contriving the
intellectual aspects in the methods of lbn AL-Jouzy and how he deals with the
text of this subject in its hygienic, natural and geographical aspects in
constructing a historical method in most scripts, the gen
Shatt Al-Diwaniya branches from Shatt Al-Hilla and extends for about 112 km until the Al-Rumaitha district within the study area located in Al-Diwaniya Governorate, Iraq. It is considered the main source for providing drinking water and supplying irrigation projects to the cities Al-Diwaniya and Al-Rumaitha. The study aims to evaluate, study, and develop Shatt Al-Diwaniya, as well as the new lined canal branching from Shatt Al-Diwaniya which. It is called Shatt Al-Diwaniya Diversion Canal. Field measurements of the discharge and water level were monitored, six sets for Shatt Al-Diwaniya and three sets for Diversion Canal. A one-dimensional model was developed by using HEC-RAS 5.0.7 so
Purpose – measure the relationship between operation management strategies as an independent variable on the customer's delight as an approved variable.
Design/methodology/approach – The research sample vocabulary included sales representatives and customers of the researched markets at a rate of (100%). The recovery rate is (95) Customers and (95) delegates for the products for the factory in neighbourhood (Banooks and Karrada ) regions were randomly chosen from an open community in these two residential areas. Statistical methods were used (arithmetic media, standard deviations, t-test, correlation coefficient (Horst), simple regression analysis).
Findings – The people in charge of the factory management nee
... Show MorePraise be to God, Lord of the worlds, and peace and blessings be upon our master Muhammad, and upon his family and companions as a whole. Now, the research deals with the grammatical issues mentioned in the Book of Al-Zahir in the meanings of people's words to Abu Bakr Al-Anbari (d. 328 AH). Two parts of the book have more than one edition, it was printed by the Iraqi Ministry of Culture and Information Beirut in 1979 AD, and the Al-Resala Foundation issued the second edition in 1992 AD The third edition was printed in Dar Al-Bashaer in Damascus in the year 2003 AD and it was the reliance on the research and the grammatical issues were arranged on topics that are: interrogation - Deletion, exclusion, marbling, call and Wallace Relief and
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreWith the increasing use of antibiotics around the world, the study and appreciation of antibiotics has become essential. An antibiotic formulation may include one or added active ingredients depending on the type and method of manufacturing the antibiotic. Antibiotics can only combat diseases of bacterial origin. As for viral diseases such as the common cold and influenza, antibiotics will not be able to combat them. The objective of this review is to digest the literature related to estimation of antibiotics and to show the methods that have been used in the estimation of the antibiotics (amoxicillin, ampicillin, cephalothin, carbenicillin, and cefotaxime) in medicinal preparations and a biological fluid for example blood
... Show MoreAbstract
The methods of the Principal Components and Partial Least Squares can be regard very important methods in the regression analysis, whe
... Show MoreIn the present paper, three reliable iterative methods are given and implemented to solve the 1D, 2D and 3D Fisher’s equation. Daftardar-Jafari method (DJM), Temimi-Ansari method (TAM) and Banach contraction method (BCM) are applied to get the exact and numerical solutions for Fisher's equations. The reliable iterative methods are characterized by many advantages, such as being free of derivatives, overcoming the difficulty arising when calculating the Adomian polynomial boundaries to deal with nonlinear terms in the Adomian decomposition method (ADM), does not request to calculate Lagrange multiplier as in the Variational iteration method (VIM) and there is no need to create a homotopy like in the Homotopy perturbation method (H
... Show More