In the name of of Allah the Merciful
Praise be to God, and blessings and peace be upon the Messenger of God, Muhammad, and upon his family and his family and peace, and after:
The honor of every knowledge of honor is related to it, and since the science of interpretation is related to the Book of God Almighty; it is considered one of the most noble and longest of sciences, and this science began long ago as the early ages of Islam have expanded the Islamic state, and people entered the religion of God in cohorts, and the mixture mixed In tongues, and people did not know much about the meanings of the Qur’an, so the need for authorship in this great knowledge was severe, and perhaps one of the first to write about the meanings of the Qur’an (Abu Ubaidah) in his book (The Metaphor of the Qur’an), Abu Ubaidah was influenced by his specialization in Arabic science, which made it the feature Notable for his book.
I found that many researchers took up this book with study from the linguistic, grammatical, and morphological fields, but I did not find anyone who talked about the explanatory aspects in it, hence the idea to write this research which deals with (Abu Ubaidah's interpretative approach in the metaphor of the Qur’an).
I have dealt with this book by reading, to determine the features of the approach taken by Abu Ubaida in it and which I will mention in the folds of the research plan shortly, and I took it upon myself to demonstrate what I decided for him by hitting some examples from his book to explain this and then compare it with other specialists, to see the extent of his approval Or his contradiction with them, knowing that the difference between him and those who joined him was that he wrote his book before the features of the interpreters' curricula became clear, and before specific rules were set for them.
The research was divided into an introduction, and three sections: I dedicated the first topic: to talk about the life and knowledge of Abu Ubaidah, and the second topic: on the approach of Abu Ubaidah in the interpretation of the dictum, and there are four requirements: the first demand: in the interpretation of the Qur’an in the Qur’an, and the second requirement in the interpretation of the Qur’an in the Sunnah And the third requirement: in the interpretation of the Qur’an with the sayings of the companions, the followers, and the fourth requirement on: the interpretation of the Qur’an with the reasons for descent, and the third topic: in the interpretation of Abu Ubaidah the Qur’an with an opinion, and it has five requirements: the first requirement: the interpretation of the Qur’an in the language, and the second requirement: the interpretation of the Qur’an with dependence as , And the third requirement: the interpretation of the Qur’an relying on a For Arab poetry, and the fourth requirement: Interpretation of the Qur’an by multiplying proverbs, and then concluded the research with the most important findings.
I have referred in that to the mothers of the books in the interpretation, language, hadith, translations, and others, and if I was injured, then God is the best and has the grace. To God, Lord of the worlds.
This research aims to learn about public relations programs and their role to enhance the morale of the State land Transport Company employees.The researcher relied on the survey method and use a questionnaire and scale tools to collect information from workers in the Department of Relations and Media and employees in all departments.
The research reached several conclusions, including:
1- Public relations seek to increase workers’ confidence in senior management and motivate them to improve their production, as well as their relentless endeavor to bring workers closer by following multiple and varied forms of communication with them.
2- The results of the study showed that there was a negative i
The research draws its importance from identifying the methods of profit management in misleading the financial statements, which in turn is reflected in the decisions of the authorities that relied on these reports, and then the models that help in detecting those methods used by the auditors. Risks. The index (margin of excess cash) was used to detect profit management practices on a group of banks listed in the Iraqi market for securities and the number of (23) banks, including (12) commercial bank and (11) Islamic bank and the results were compared to commercial banks with Islamic banks.((The research started from the hypothesis that the use of the (excess cash margin) model in the banking sector reveals the management
... Show MoreIn this paper we use the Markov Switching model to investigate the link between the level of Iraqi inflation and its uncertainty; forth period 1980-2010 we measure inflation uncertainty as the variance of unanticipated inflation. The results ensure there are a negative effect of inflation level on inflation uncertainty and all so there are a positive effect of inflation uncertainty on inflation level.  
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreIn this paper we used frequentist and Bayesian approaches for the linear regression model to predict future observations for unemployment rates in Iraq. Parameters are estimated using the ordinary least squares method and for the Bayesian approach using the Markov Chain Monte Carlo (MCMC) method. Calculations are done using the R program. The analysis showed that the linear regression model using the Bayesian approach is better and can be used as an alternative to the frequentist approach. Two criteria, the root mean square error (RMSE) and the median absolute deviation (MAD) were used to compare the performance of the estimates. The results obtained showed that the unemployment rates will continue to increase in the next two decade
... Show MoreThis study describes how fuzzy logic control FLC can be applied to sonars of mobile robot. The fuzzy logic approach has effects on the navigation of mobile robots in a partially known environment that are used in different industrial and society applications. The fuzzy logic provides a mechanism for combining sensor data from all sonar sensors which present different information. The FLC approach is achieved by means of Fuzzy Decision Making method type of fuzzy logic controller. The proposed controller is responsible for the obstacle avoidance of the mobile robot while traveling through a map from a home point to a goal point. The FLC is built as a subprogram based on the intelligent architecture (IA). The software program uses th
... Show MoreRobots have become an essential part of modern industries in welding departments to increase the accuracy and rate of production. The intelligent detection of welding line edges to start the weld in a proper position is very important. This work introduces a new approach using image processing to detect welding lines by tracking the edges of plates according to the required speed by three degrees of a freedom robotic arm. The two different algorithms achieved in the developed approach are the edge detection and top-hat transformation. An adaptive neuro-fuzzy inference system ANFIS was used to choose the best forward and inverse kinematics of the robot. MIG welding at the end-effector was applied as a tool in this system, and the wel
... Show MoreA fuzzy logic approach (FLA) application in the process of stud arc welding environment was implemented under the condition of fuzziness input data. This paper is composed of the background of FLA, related research work review and points for developing in stud welding manufacturing. Then, it investigates thecase of developingstud arc welding process on the controversial certaintyof available equipment and human skills.Five parameters (welding time, sheet thickness, type of coating, welding current and stud shape) were studied.A pair of parameter was selected asiteration whichis welding current and welding time and used fo
... Show More