The aim of the current research is to study a topic from the Qur’anic topics, few have researched it and realized its content, so people knew it in one name in the Qur’an in another name, and due to the ancientity of the topic and its contemporaneity, I wanted to write about it. The research has an introduction, three demands, and a conclusion with the most important results of the research:
As for the introduction: It was to indicate the importance of the topic and an optional reason for it.
As for the first requirement: it included the definition of reasoning, its divisions, and its characteristics.
As for the second requirement, it was to indicate the meaning, types, and methods of labeling it.
As for the third requirement, it has ensured the Qur’anic application of the signs of branding and stating the type of reasoning therein and to what part of the marking it belongs.
As for the conclusion: It was to show the most important results that she reached, and she came up with an important result, which is: The person’s distance from bad thoughts and suspicious fantasies makes him closer to God and the truth.
Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show Morehave suffered from deteriorating residential neighborhoods, poor economic, social and urban living conditions of the population and deteriorating the infrastructural and superior services. These problems were the secretions of these cities' rapid urbanization. Based on the principles of sustainable urban planning and in order to achieve adequate opportunities for the lives of the population and provide them with sustainable livelihoods, policies have emerged to upgrade along the lines of community participation and programmes to reform and develop those neighbourhoods, raise their efficiency and make them livable. Thus, the problem of research was identified "The absence of a comprehensive cognitive perception of the most prominent facto
... Show MorePeriodontitis is a dysbiosis-driven inflammatory disease in which a pathogenic subgingival biofilm disrupts the host–microbe equilibrium and promotes progressive loss of tooth-supporting tissues. While periodontal destruction has traditionally been explained mainly through the host immune response, increasing experimental and clinical evidence suggests that epithelial–mesenchymal transition (EMT)-like changes in the gingival epithelium may contribute to barrier failure and tissue remodeling during disease progression. EMT is characterized by reduced epithelial adhesion and polarity, alongside a shift toward a mesenchymal-like phenotype with enhanced motility and impaired epithelial barrier function. This narrative review focuses
... Show MoreCommunity pharmacists faced more complex challenges in meeting patients’ medication needs during the pandemic than previously reported in the literature. Objectives To explore the perception and abilities of community pharmacists in managing patients’ needs in terms of medication dispensing during the pandemic, and to examine its effect on improving the patients’ situations. Materials and Methods A cross-sectional study design, validated by 30 experts, was conducted using an electronic survey (Google Form) to assess the effect of the dispensing practice of Iraqi community pharmacists on the patient’s clinical outcomes during the pandemic. The survey was distributed on professional pharmacist’s social media platforms from December
... Show MoreMaintenance of hospital buildings and its management are regarded as an important subject which needs attention because hospital buildings are service institutions which are very important to a society, requiring the search for the best procedure to develop maintenance in hospitals. The research is aimed to determine an equation to estimate the annual maintenance cost for public hospital. To achieve this aim, Al-Sader City Hospital maintenance system in Al-Najaf province has been studied with its main elements through survey of data, records and reports relating to maintenance during the years of the study 2008-2014 and to identify the strengths, weaknesses, opportunities and threat points in the current system through Swat analysi
... Show MoreWith the increasing reliance on microgrids as flexible and sustainable solutions for energy distribution, securing decentralized electricity grids requires robust cybersecurity strategies tailored to microgrid-specific vulnerabilities. The research paper focuses on enhancing detection capabilities and response times in the face of coordinated cyber threats in microgrid systems by implementing advanced technologies, thereby supporting decentralized operations while maintaining robust system performance in the presence of attacks. It utilizes advanced power engineering techniques to strengthen cybersecurity in modern power grids. A real-world CPS testbed was utilized to simulate the smart grid environment and analyze the impact of cyberattack
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Robots have become an essential part of modern industries in welding departments to increase the accuracy and rate of production. The intelligent detection of welding line edges to start the weld in a proper position is very important. This work introduces a new approach using image processing to detect welding lines by tracking the edges of plates according to the required speed by three degrees of a freedom robotic arm. The two different algorithms achieved in the developed approach are the edge detection and top-hat transformation. An adaptive neuro-fuzzy inference system ANFIS was used to choose the best forward and inverse kinematics of the robot. MIG welding at the end-effector was applied as a tool in this system, and the wel
... Show More