Preferred Language
Articles
/
jcois-1562
The Concept of the Text, its Divisions, Connotations, and Methodology
...Show More Authors

The text has many connotations in the Arabic language, such as vowel points, designation, completion, etc., and the original meaning of the text is to show. The Western text has its owen independent semantic unit .The biblical texts are a mixture of what was reported by the Prophet Moses (peace be upon him) and what the authors described in terms of texts over many centuries.The meaning of the text is guidance and payment, and it is a natural connotation. The religious text for Muslims is divided into peremptory texts that are national proof. The evidence for the meaning of the text is proven by language, and it is not required that the researcher be a jurist. The approach is a factual questionnaire by the researcher according to a specific scientific approach. As for the methodology, it searches for the scientific means that pervade all cognitive processes. One of the mechanisms for understanding the sacred text of Westerners is hermeneutics, which played a fundamental role in understanding religious texts by creating principles and laws for interpretation so that it is logical.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 31 2017
Journal Name
College Of Islamic Sciences
Westernization in the sciences of rhetoric, its beginnings and development
...Show More Authors

Research summary

 


Westernization is a term not familiar to our scholars at the beginning of the emergence of translation from Western literature, sciences and arts in its detailed form now.

Westernization was not an issue that those Greeks, Persians, Romans, Indians and others worked on translating those sciences and cultures. Rather, it was a process of transferring a new philosophy and logic that had not been previously seen by the Arabs, so they were affected by it in a strange way, to the point of fascination by some of them. For this reason, this research came to clarify these issues and address them within the scientific methodology.

View Publication Preview PDF
Publication Date
Tue Mar 15 2022
Journal Name
Al-academy
Bionic and its reflections in the design of industrial products
...Show More Authors

The current research dealt with the development of sciences and arts over the course of human history, and the development of sciences with their natural and human trends are important areas in developing the knowledge and application base for industrial product design and design in its various fields. Bionic science is one of the sciences that works on applying biological methods and systems found in nature to study and design engineering systems and modern technology, and for industrial products to be highly efficient, durable and resistant to natural variables in daily life for use. The transfer of technology between life forms and industrial products is desirable because the processes of development at the level of science in general

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 23 2020
Journal Name
Biomed Research International
A Computational Model of the Brain Cortex and Its Synchronization
...Show More Authors

Obtaining the computational models for the functioning of the brain gives us a chance to understand the brain functionality thoroughly. This would help the development of better treatments for neurological illnesses and disorders. We created a cortical model using Python language using the Brian simulator. The Brian simulator is specialized in simulating the neuronal connections and synaptic interconnections. The dynamic connection model has multiple parameters in order to ensure an accurate simulation (Bowman, 2016). We concentrated on the connection weights and studied their effect on the interactivity and connectivity of the cortical neurons in the same cortical layer and across multiple layers. As synchronization helps us to mea

... Show More
View Publication
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Sep 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Servant Leadership and its Impact on the Effectiveness of Teamwork
...Show More Authors

   The research problem stems from the suffering of organizations from the weakness of their organizing aspect and the weak influence of the leadership on the subordinates and their dispersion. Organizations today are in rapid development and therefore work relations are not dominated by the humanitarian aspect and the first goal has become productivity. The research aims to identify the influence of servant leadership and its dimensions as an independent variable on the effectiveness of work teams as an approved variable and their importance increases when these organizations are service organizations, and how their influence increases when this leadership is the servant leadership and its dimensions in the Health Depa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Al–bahith Al–a'alami
The Role of Internet and its Applications in Spreading Rumors
...Show More Authors

The study tries to answer several questions posed by the subject, one of the important: How the Internet promotes rumor? And what are the most Internet applications that promote rumor? And the practical ways to reduce these negative? Using the process of in vestige and reading theoretical heritage available in this field, and inferred the numbers and statistics marked the uses of the Internet and its applications over recent years, and the characteristics of each these tools in the field of collection, processing, and dissemination of information

View Publication Preview PDF
Crossref
Publication Date
Tue Apr 01 2003
Journal Name
Abhath Al- Yarmouk [basic Sciences And Engineering]
Methodology for selecting Nonprestressed Steel in Post- Tensioning Beams
...Show More Authors

Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Sat Nov 02 2019
Journal Name
Advances In Intelligent Systems And Computing
Spin-Image Descriptors for Text-Independent Speaker Recognition
...Show More Authors

Building a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding text in gray image using mapping technique
...Show More Authors

Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More