Preferred Language
Articles
/
jcois-796
Subject matter  for speakers
...Show More Authors

Praise be to God, Lord of the worlds, and prayers and peace be upon our master Muhammad and upon his family and companions as a whole.
    The topic of attention was drawn to the attention of the speakers, as it made me ponder it carefully, and my goal in that is to know the reason for the interest of the speakers and their care for it, and to clarify from their books the purpose of making this topic one of the advanced investigations with them.

     The idea of ​​writing a paper on the subject of consideration was not absent from my thinking, because I saw the attention of speakers on this issue, as they made it one of the first issues that they deal with studying in their works because they relate to faith in God, glory be to Him, and is linked to the method of inferring the existence of God Almighty which includes meditation on the effects of existence, as Looking at the speakers means that the person charged with the evidence looks at the evidence to move to the science in terms, meaning that you follow the evidence, reflect on it, and observe the effects of work that leads to knowledge of the existence of the mastermind creator. Sorcerer E, and the maker of the author.

     Hence you realize the importance of this topic, and for this reason the speakers expanded its research in terms of stating linguistic and idiomatic meaning, as well as in many other ways, as they discussed the necessity of commissioning in order to arrive at the knowledge of God, glory be to Him, knowledge of His attributes, what he must and impossible to do, and they answered Through this topic, there are many questions related to the matter of consideration, including: Is the commissioning of consideration binding on the public or is it restricted to the private? Is looking useful science or not benefit it? Is knowledge of God Almighty obligatory, or not? What is the origin of this obligation? Is it Sharia or the mind? And other matters related to vision.

     The speakers were not satisfied with that but rather answered all the objections and problems presented by their violators, opposing the evidence that the speakers used to infer and relied on in the ruling that consideration must be given whether these objections are directed to the legal texts inferred or to the consensus that was said or to the mental rules that supported Forensic evidence and consensus.
    That is why I found it appropriate to stand with the phrases of the speakers in an attempt to rearrange and facilitate them, enlightened by the sound scientific method and the sober research context. An approach that combines the Qur’anic statement and the verbal report, so I made my research tagged (the topic of looking at speakers), which includes an introduction, two articles, and a conclusion ..

                                  And Praise be to Allah, the Lord of the Worlds

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 06 2019
Journal Name
Karbala International Journal Of Modern Science
Stereo Photogrammetry vs Computed Tomography for 3D Medical Measurements
...Show More Authors

View Publication
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Ieee Transactions On Emerging Topics In Computational Intelligence
Reservoir Network With Structural Plasticity for Human Activity Recognition
...Show More Authors

View Publication
Scopus (1)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Jan 02 2017
Journal Name
European Journal Of Scientific Research
Fast approach for arabic text encryption using genetic algorithm
...Show More Authors

As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res

... Show More
Publication Date
Tue May 16 2023
Journal Name
Mathematics
A Mathematical Study for the Transmission of Coronavirus Disease
...Show More Authors

Globally, the COVID-19 pandemic’s development has presented significant societal and economic challenges. The carriers of COVID-19 transmission have also been identified as asymptomatic infected people. Yet, most epidemic models do not consider their impact when accounting for the disease’s indirect transmission. This study suggested and investigated a mathematical model replicating the spread of coronavirus disease among asymptomatic infected people. A study was conducted on every aspect of the system’s solution. The equilibrium points and the basic reproduction number were computed. The endemic equilibrium point and the disease-free equilibrium point had both undergone local stability analyses. A geometric technique was used

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Computers, Materials & Continua
An Optimal Algorithm for Resource Allocation in D2D Communication
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Engineering
Estimation of Mass Transfer Coefficient for Copper Electrowinning Process
...Show More Authors

Mass transfer was examined at a stationary rectangular copper electrode (cathode) by using the reduction of cupric ions as the electrochemical reaction. The influence of electrolyte temperature (25, 45, and 65 oC), and cupric ions concentration (4, 8, and 12 mM) on mass transfer coefficient were investigated by using limiting current technique. The mass transfer coefficient and hence the Sherwood number was correlated as Sh =

 

View Publication Preview PDF
Publication Date
Sun Dec 02 2012
Journal Name
Baghdad Science Journal
Stability of Back Propagation Training Algorithm for Neural Networks
...Show More Authors

In this paper, we derive and prove the stability bounds of the momentum coefficient µ and the learning rate ? of the back propagation updating rule in Artificial Neural Networks .The theoretical upper bound of learning rate ? is derived and its practical approximation is obtained

View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Materials Research Express
SiC composite based selective electromagnetic propagation for GHz application
...Show More Authors

View Publication
Scopus (6)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Proceedings Of The Conference “recent Trends In Engineering Sciences And Sustainability”, Baghdad
GNSS positioning techniques for enhancing Google Earth data quality
...Show More Authors

Due to the easily access to the satellite images, Google Earth (GE) images have become more popular than other online virtual globes. However, the popularity of GE is not an indication of its accuracy. A considerable amount of literature has been published on evaluating the positional accuracy of GE data; however there are few studies which have investigated the subject of improving the GE accuracy. In this paper, a practical method for enhancing the horizontal positional accuracy of GE is suggested by establishing ten reference points, in University of Baghdad main campus, using different Global Navigation Satellite System (GNSS) observation techniques: Rapid Static, Post-Processing Kinematic, and Network. Then, the GE image for the study

... Show More
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref