There are great figures in our nation, who are famous for their encyclopedia in their sciences, and their fame spreads across the horizons for what they presented to their religion and nation.
So they became torches of guidance, advocates of goodness, and treasuries of knowledge until God inherits the earth and those on it.
Among these imams is Imam al-Qurtubi, who died in the year (671 AH), after whom he left a great legacy of valuable books, including this one, which is the subject of my research, his valuable interpretation (Al-Jami’ Li Ahkam Al-Qur’an). Taking from him and his approach in interpreting the verses of judgment, following the method of extrapolation, investigation and deduction to know his style, which he used in his authorship, and to stand on the sources that he relied on in his book.
Abstract: Various peoples have contributed to building the Islamic civilization through the achievements and creativity of their scholars. In particular, the Kurdish scholars have provided new and great services to the Holy Qur’an that deserves attention. For example, it is no secret that Sheikh Ahmadian, with his interpretation, rendered a great service to the Glorious Book of God. His style is distinguished by modernity, seriousness and objectivity, and represents a lively response to the needs of the Kurdish Muslim people. Due to the importance of Ahmadian’s interpretation of the Qur’an, therefore, I have demonstrated his approach in this research in terms of dealing with his interpretation of the Qur’an with the Qur’an, the
... Show MoreIn the present work, the image and representation of Adela, the youngest daughter of the family of the Casa de Bernarda Alba, one of the most popular works of the Spanish author Federico García Lorca (1898-1936), will be analyzed. In this work, there are different themes, but what concerns us is to show the repression, oppression and rebellion of this character in a context of customs of the 1920s in Spain. They are revealing elements in that period in which women were relegated to the background, despite the fact that a feminist movement had already begun in Spain. By studying Adela, we seek to see how a single woman confronts her family and the society that surrounds her to fight for freedom, although its end is finally linked to
... Show MoreThe concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show MoreThis study is aimed to Green-synthesize and characterize Al NPs from Clove (Syzygium aromaticum
L.) buds plant extract and to investigate their effect on isolated and characterized Salmonella enterica growth.
S. aromaticum buds aqueous extract was prepared from local market clove, then mixed with Aluminum nitrate
Al(NO3)3. 9 H2O, 99.9% in ¼ ratio for green-synthesizing of Al NPs. Color change was a primary confirmation
of Al NPs biosynthesis. The biosynthesized nanoparticles were identified and characterized by AFM, SEM,
EDX and UV–Visible spectrophotometer. AFM data recorded 122nm particles size and the surface roughness
RMs) of the pure S. aromaticum buds aqueous extract recorded 17.5nm particles s
An optoelectronic flow-through detector for active ingredients determination in pharmaceutical formulations is explained. Two consecutive compact photodetector’s devices operating according to light-emitting diodes-solar cells concept where the LEDs acting as a light source and solar cells for measuring the attenuated light of the incident light at 180˚ have been developed. The turbidimetric detector, fabricated of ten light-emitting diodes and five solar cells only, integrated with a glass flow cell has been easily adapted in flow injection analysis manifold system. For active ingredients determination, the developed detector was successfully utilized for the development and validation of an analytical method for warfarin determination
... Show MoreJohn Dewey is an American philosopher and psychologist. He is one of the primary figures of the philosophy of pragmatism. He is considered one of its founders and one of the leaders of the philosophy of pragmatism. He is one of the most famous figures of the modern education on the international level. His name is associated with the philosophy of education, because he delved in defining the purpose of education and went on talking about linking the theories with the reality without being subject to the existing system and the inherited traditions no matter how ancient they were. He is the godfather of progressive or gradual education, and he is one of the pioneers who established the experimental school in America in cooperation
... Show More
Abstract
The main goal of this study is to showcase the aesthetic values contained in Nahj Al-Balagha by exploring its wide horizons and enriching the subject of rhetoric with new forms and images that did not exist in other books, as they characterized no other book but Nahj Al-Balagha. Imam Ali mastered the use of rhetorical forms in his speech to the fullest extent that such forms raced to his thought one after the other to book their place amongst the topics of religious and earthly life. One of those rhetoric forms is synecdoche, in its various parts. Due to this form great importance and high status, it was used by the Imam at many
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show More
