A disagreement has arisen among scholars regarding the ruling on historical statues and monuments in Muslim countries, especially after the Taliban blew up some huge historical statues, and we have witnessed different positions that reach the point of contradiction, each claiming to be right, and now that the crisis has passed and the intensity of the dispute has subsided, I see It is appropriate to discuss this issue calmly, without drifting behind this or that party, to find out the legal position on these statues and monuments.
I presented the most prominent modern opinions related to the subject and discussed them in this research, which I called (Sharia’s position on historical statues and monuments), in which I tried to reach a fair judgment away from fanaticism and prejudices, and I traced these sayings from issued fatwas, newspapers, television, and the Internet.
This research aims to analyze the impact of effective manufacturing strategy on total productive maintenance. Effective manufacturing focuses on improving product quality, increasing productivity, and reducing costs, while total productive maintenance focuses on maintaining machines and equipment in good operational condition and high efficiency. The research seeks to understand how to achieve integration between these two dimensions to achieve excellent performance in manufacturing operations. The study was conducted using the General Company for Battery Manufacturing as a research community, with a sample size of 60 individuals. The research found significant results, including the fact that using an effective manufacturing strategy leads
... Show MoreMoisture induced damage can cause a progressive deterioration in the performance of asphalt pavement by the loss of adhesion between asphalt binder and aggregate surface and/or loss of cohesion within the binder in the presence of water. The objective of this paper is to improve the asphalt mixtures resistance to moisture by using hydrated lime as an anti-stripping additive. For this purpose, two types of asphalt binder were utilized; asphalt grades (40-50) and (60-70) with one type of aggregate of 19.0 mm aggregate nominal maximum size, and limestone dust as a mineral filler. Marshall method was adopted to find the optimum asphalt content. Essentially, two parameters were determined to evaluate the moisture susceptibili
... Show MoreIntroduction The pathophysiology of appendicitis likely stems from obstruction of the appendiceal orifice leading to an increase in intraluminal and intramural pressure, resulting in small vessel occlusion and lymphatic stasis. Organ supplied by an end artery, such as the appendix, are more prone to the deleterious effects of arterial occlusion. The continuous cigarette smoking might be associated with a greater risk for developing atherosclerosis.
Objectives The aim is to evaluate the effect of cigarette smoking on the incidence of complications of acute appendicitis.
Methods Patients suffered from symptoms and signs suggesting a
Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreIn this research, the effect of changing the flood level of Al-Shuwaija marsh was studied using the geographic information systems, specifically the QGIS program, and the STRM digital elevation model with a spatial analysis accuracy of 28 meters, was used to study the marsh. The hydraulic factors that characterize the marsh and affecting on the flooding such as the ranks of the water channels feeding the marsh and the degree of slope and flat areas in it are studied. The area of immersion water, the mean depth, and the accumulated water volume are calculated for each immersion level, thereby, this study finds the safe immersion level for this marsh was determined.
This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreIn this paper the definition of fuzzy normed space is recalled and its basic properties. Then the definition of fuzzy compact operator from fuzzy normed space into another fuzzy normed space is introduced after that the proof of an operator is fuzzy compact if and only if the image of any fuzzy bounded sequence contains a convergent subsequence is given. At this point the basic properties of the vector space FC(V,U)of all fuzzy compact linear operators are investigated such as when U is complete and the sequence ( ) of fuzzy compact operators converges to an operator T then T must be fuzzy compact. Furthermore we see that when T is a fuzzy compact operator and S is a fuzzy bounded operator then the composition TS and ST are fuzzy compact
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show More