Logic is one of the sciences that have receded and regressed in the field of Islamic sciences. This regression is the result of several factors, the most important of which are:
1- The Aristotelian logic, concerned with the seemingly essential shape and the underlying truth in the text, which has been translated into Arabic, is no longer able to keep pace with scientific revelations and epistemological spaces of our time.
2- The existence of logic in the curricula of Islamic studies was not subject to a study linking logic and Islamic sciences. Therefore, we find that the student studies logic as if it were a strange subject that has nothing to do with the subjects of Islamic studies and even Islamic philosophy.
3- Logic is
The political parties are considered to be the basic infrastructure in the political process for their great role in achieving the political movement in the country and to work on implementing the goals and interests of its voters in the event of their coming to power. If the parties that totalitarianism led to monopoly and monopolization, We can not talk in these countries about the liberal concept of the party and can not talk about the existence of a law or laws and regulations governing and regulate the work of parties. But on the other hand, which is represented by the liberal state, we find a lot of talk and practice about the form and nature of the legitimate law in regulating the formation of parties and their work in a manner th
... Show MorePermeability estimation is a vital step in reservoir engineering due to its effect on reservoir's characterization, planning for perforations, and economic efficiency of the reservoirs. The core and well-logging data are the main sources of permeability measuring and calculating respectively. There are multiple methods to predict permeability such as classic, empirical, and geostatistical methods. In this research, two statistical approaches have been applied and compared for permeability prediction: Multiple Linear Regression and Random Forest, given the (M) reservoir interval in the (BH) Oil Field in the northern part of Iraq. The dataset was separated into two subsets: Training and Testing in order to cross-validate the accuracy
... Show MoreTheoretical and experimental investigations of free convection through a cubic cavity with sinusoidal heat flux at bottom wall, the top wall is exposed to an outside ambient while the other walls are adiabatic saturated in porous medium had been approved in the present work. The range of Rayleigh number was and Darcy number values were . The theoretical part involved a numerical solution while the experimental part included a set of tests carried out to study the free convection heat transfer in a porous media (glass beads) for sinusoidal heat flux boundary condition. The investigation enclosed values of Rayleigh number (5845.6, 8801, 9456, 15034, 19188 and 22148) and angles of inclinations (0, 15, 30, 45 and 60 degree). The numerical an
... Show MoreThe research aims to identify banking stress tests, which is one of the modern and important tools in managing banking risks by applying the equations of that tool to the sample. The banking sector considered one of the most vulnerable to sudden and rapid changes in an unstable economic environment, making it more vulnerable. Therefore, it is necessary to establish a special risk management section to reduce the banking risks of the banking business that negatively affect its performance.
The research concluded that there is a direct relationship between stress tests and risk management, as stress tests are an essential tool in risk management. They also considered a unified approach in managing bank risks that helps the bank to
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More