Research objective: This research aims to unveil how to use the method of referral in understanding the Holy Quran.
The reason for choosing the research: The one that invited me to write on this topic is the importance of the referral method, so I liked the research in it, and unveiled this wonderful Qur’anic method, so that it helps to understand the intention of God Almighty in his dear book.
The research plan: The research was divided into three topics and a conclusion.
As for the first topic, it is divided into two requirements. The first requirement deals with the definition of referral language.
In the second requirement, the referral defined convention.
As for the second topic, it deals with the types of referral, and it is divided into two requirements. The first requirement is external referral (maqam). The second requirement is internal (textual) referral.
As for the third topic, it deals with examples of referral from the Holy Qur’an, Surat Al-Anam as a model, and it is divided into two requirements, the first requirement is the definition of Surat Al-Anam. And the second requirement, in which some applications of the referral method are mentioned in Surat Al-Anam.
This paper presents the effect of relativistic and ponderomotive nonlinearity on cross-focusing of two intense laser beams in a collisionless and unmagnetized plasma. It should be noted here that while considering the self-focusing due to relativistic electron mass variation, the electron ponderomotive density depression in the channel may also be important. Therefore/these two nonlinearties may simultaneously affect the self-focusing process. These nonlinearities depend not only on the intensity of one laser but also on the second laser. Therefore, one laser beam affects the dynamics of the second beam and hence the process of cross-focusing takes place. The electric field amplitude of the excited electron plasma wave (EPW) has been cal
... Show MoreIt has increasingly been recognised that the future developments in geospatial data handling will centre on geospatial data on the web: Volunteered Geographic Information (VGI). The evaluation of VGI data quality, including positional and shape similarity, has become a recurrent subject in the scientific literature in the last ten years. The OpenStreetMap (OSM) project is the most popular one of the leading platforms of VGI datasets. It is an online geospatial database to produce and supply free editable geospatial datasets for a worldwide. The goal of this paper is to present a comprehensive overview of the quality assurance of OSM data. In addition, the credibility of open source geospatial data is discussed, highlighting the diff
... Show MoreThis paper deals with a Twin Rotor Aerodynamic System (TRAS). It is a Multi-Input Multi-Output (MIMO) system with high crosscoupling between its two channels. It proposes a hybrid design procedure that combines frequency response and root locus approaches. The proposed controller is designated as PID-Lead Compensator (PIDLC); the PID controller was designed in previous work using frequency response design specifications, while the lead compensator is proposed in this paper and is designed using the root locus method. A general explicit formula for angle computations in any of the four quadrants is also given. The lead compensator is designed by shifting the dominant closed-loop poles slightly to the left in the
... Show MoreThe issue of penalized regression model has received considerable critical attention to variable selection. It plays an essential role in dealing with high dimensional data. Arctangent denoted by the Atan penalty has been used in both estimation and variable selection as an efficient method recently. However, the Atan penalty is very sensitive to outliers in response to variables or heavy-tailed error distribution. While the least absolute deviation is a good method to get robustness in regression estimation. The specific objective of this research is to propose a robust Atan estimator from combining these two ideas at once. Simulation experiments and real data applications show that the proposed LAD-Atan estimator
... Show MoreProblem of water scarcity is becoming common in many parts of the world. Thus to overcome this problem proper management of water and an efficient irrigation systems are needed. Irrigation with buried vertical ceramic pipe is known as a very effective in management of irrigation water. The two- dimensional transient flow of water from a buried vertical ceramic pipe through homogenous porous media is simulated numerically using the software HYDRUS/2D to predict empirical formulas that describe the predicted results accurately. Different values of pipe lengths and hydraulic conductivity were selected. In addition, different values of initial volumetric soil water content were assumed in this simulation a
... Show MoreIn this study, nano TiO2 was prepared with titanium isopropoxide (TTIP) as a resource to titanium oxide. The catalyst was synthesized using phosphotungstic acid (PTA) and, stearyl trimethyl ammonium bromide (STAB) was used as the structure-directing material. Characterization of the product was done by the X-ray diffraction (XRD), X-ray fluorescent spectroscopy (XRF), nitrogen adsorption/desorption measurements, Atomic Force Microscope (AFM) and Fourier transform infrared (FTIR) spectra, were used to characterize the calcined TiO2 nanoparticles by STAB and PWA. The TiO2 nanomaterials were prepared in three crystalline forms (amorphous, anatase, anatase-rutile). The results showed that the
... Show MoreFinite Element Approach is employed in this research work to solve the governing differential equations related to seepage via its foundation's dam structure. The primary focus for this reason is the discretization of domain into finite elements through the placement of imaginary nodal points and the discretization of governing equations into an equation system; An equation for each nodal point or part, and unknown variables are solved. The SEEP / W software (program) is a sub-program of the Geo-Studio software, which is used by porous soil media to compensate for the problems of seepage. To achieve the research goals, a study was carried out on Hemrin dam, which located in the Diyala River 100 km northeast of Baghdad, Iraq. Thus, o
... Show MoreMany previous investigations have found quercetin to be a powerful antioxidant and antitumor flavonoid, but its poor bioavailability has limited its use. This current study investigated the effects of two newly synthesized Quercetin Schiff bases containing 2-amino thiadiazole-5-thiol (Q1), and its benzyl derivatives (Q2) on MCF-7 human breast cancer cells. Cell viability and apoptosis were assessed to determine the toxic effects of Q1 and Q2. Cytotoxicity valuation showed that both compounds inhibited MCF-7 cell growth, and lactate dehydrogenase (LDH) activity increased in a dose-dependent aspect compared to the control group. Comet assay results observed that Q1 and Q2 induce more serious DNA damage than the control (untreated cell
... Show MoreAddressed the problem of the research is marked: (Performing processors for the time between Impressionism and superrealism) the concept of time and how to submit artwork. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. Then determine the research objectives of (detection processors performing to the concept of time in works of art in each of Impressionism and superrealism. And a comparison between them to reveal similarities and differences), followed by the establishment of boundaries Find three (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theore
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More