In the name of of Allah the Merciful
Praise be to God, and blessings and peace be upon the Messenger of God, Muhammad, and upon his family and his family and peace, and after:
The honor of every knowledge of honor is related to it, and since the science of interpretation is related to the Book of God Almighty; it is considered one of the most noble and longest of sciences, and this science began long ago as the early ages of Islam have expanded the Islamic state, and people entered the religion of God in cohorts, and the mixture mixed In tongues, and people did not know much about the meanings of the Qur’an, so the need for authorship in this great knowledge was severe, and perhaps one of the first to write about the meanings of the Qur’an (Abu Ubaidah) in his book (The Metaphor of the Qur’an), Abu Ubaidah was influenced by his specialization in Arabic science, which made it the feature Notable for his book.
I found that many researchers took up this book with study from the linguistic, grammatical, and morphological fields, but I did not find anyone who talked about the explanatory aspects in it, hence the idea to write this research which deals with (Abu Ubaidah's interpretative approach in the metaphor of the Qur’an).
I have dealt with this book by reading, to determine the features of the approach taken by Abu Ubaida in it and which I will mention in the folds of the research plan shortly, and I took it upon myself to demonstrate what I decided for him by hitting some examples from his book to explain this and then compare it with other specialists, to see the extent of his approval Or his contradiction with them, knowing that the difference between him and those who joined him was that he wrote his book before the features of the interpreters' curricula became clear, and before specific rules were set for them.
The research was divided into an introduction, and three sections: I dedicated the first topic: to talk about the life and knowledge of Abu Ubaidah, and the second topic: on the approach of Abu Ubaidah in the interpretation of the dictum, and there are four requirements: the first demand: in the interpretation of the Qur’an in the Qur’an, and the second requirement in the interpretation of the Qur’an in the Sunnah And the third requirement: in the interpretation of the Qur’an with the sayings of the companions, the followers, and the fourth requirement on: the interpretation of the Qur’an with the reasons for descent, and the third topic: in the interpretation of Abu Ubaidah the Qur’an with an opinion, and it has five requirements: the first requirement: the interpretation of the Qur’an in the language, and the second requirement: the interpretation of the Qur’an with dependence as , And the third requirement: the interpretation of the Qur’an relying on a For Arab poetry, and the fourth requirement: Interpretation of the Qur’an by multiplying proverbs, and then concluded the research with the most important findings.
I have referred in that to the mothers of the books in the interpretation, language, hadith, translations, and others, and if I was injured, then God is the best and has the grace. To God, Lord of the worlds.
A fuzzy logic approach (FLA) application in the process of stud arc welding environment was implemented under the condition of fuzziness input data. This paper is composed of the background of FLA, related research work review and points for developing in stud welding manufacturing. Then, it investigates thecase of developingstud arc welding process on the controversial certaintyof available equipment and human skills.Five parameters (welding time, sheet thickness, type of coating, welding current and stud shape) were studied.A pair of parameter was selected asiteration whichis welding current and welding time and used fo
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023
The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreThis paper presents a new transform method to solve partial differential equations, for finding suitable accurate solutions in a wider domain. It can be used to solve the problems without resorting to the frequency domain. The new transform is combined with the homotopy perturbation method in order to solve three dimensional second order partial differential equations with initial condition, and the convergence of the solution to the exact form is proved. The implementation of the suggested method demonstrates the usefulness in finding exact solutions. The practical implications show the effectiveness of approach and it is easily implemented in finding exact solutions.
Finally, all algori
... Show MoreEstimating the semantic similarity between short texts plays an increasingly prominent role in many fields related to text mining and natural language processing applications, especially with the large increase in the volume of textual data that is produced daily. Traditional approaches for calculating the degree of similarity between two texts, based on the words they share, do not perform well with short texts because two similar texts may be written in different terms by employing synonyms. As a result, short texts should be semantically compared. In this paper, a semantic similarity measurement method between texts is presented which combines knowledge-based and corpus-based semantic information to build a semantic network that repre
... Show MoreAbstract
This study aims to identify the reality of using electronic applications in teaching language skills to people with mild intellectual disabilities from the mothers’ perspective. A descriptive approach was used. The electronic questionnaires were administered to the study sample, 122 responses were received from mothers of the students with mild intellectual disability in Hafer Al-Baten schools. The response average rate was 94%. The results showed that there are statistically significant differences that are related to the variant of monthly income as for the barriers to using electronic applications in such schools, whereas there were no differences regarding the variant of monthly income regarding t
... Show MoreThe research aims at determining the main reason for the deterioration of the services and determining the correct method of distributing the funds to the administrative and administrative units. The discrepancy between the size of the financial allocations and the municipal services was the main research problem. Therefore, the researcher identified the gaps in municipal services by the concerned departments and compared them with The percentage of funds obtained through the work of a checklist for each of the directorates concerned. The researcher studied the specific criteria for these services, which were approved by the Ministry of Construction, Housing, Municipalities, and Public Works, and compared them wi
... Show MoreThe aim of the study was to know the factors analysis of scale Bar-On & Parker, post analysis is found fourteen factors for the first degree of the scale. Also we extracted five factors from the second degree.
The scale consists of (60) items , applied on sample of (200) students (Male &Female ) age (15-18) years randomly chosen from preparatory schools . The scale unveiled satis factors validity and reliability. An others aims is to low the emotional Intelligence level and know the difference of statistical in sex , age variable and the specialization variable .The result was no difference of statistical in sex and specialization variable , but the difference appear
... Show MoreObjective of the research This study aimed to manufacture an innovative device that enables the player to walk after the operation and improves functional efficiency through improvement in the range of motion as well as improvement in the size of the muscles working on the knee joint Imposing research There are statistically significant differences between the pre and posttests of the experimental and control groups, there are Statistically significant differences between the post-tests between the experimental group and the control group in favor of the experimental group of the research sample. The researchers used the experimental approach by designing the control and experimental groups with a test (pre-post) for the suitabili
... Show More