Preferred Language
Articles
/
4hZe34sBVTCNdQwC7eLw
References for Receiving Explicit and Implicit Knowledge in the Holy Quran
...Show More Authors

The research aims to explain the References of receiving the explicit and implicit knowledge mentioned in the Noble Qur'an. The two researchers adopted the documentary and inductive approach to study the topic. Among the conclusions of the research: The Noble Qur'an dealt with many terms and concepts that refer to the References of making explicit knowledge available, including books, which were represented by the divine books (the Qur'an, the Torah, the Zabur and the Gospel) and their concepts (the book, the Qur'an, the guidance, the remembrance, the revelation, the light, the newspapers, the plates). He dealt with many concepts that refer to the References of providing tacit knowledge, which was represented by the communication between two or more persons, whether between Allah Almighty and humans or between human beings themselves, which were represented by speech, dialogue, communication, consultation, or discourse on a specific topic. And terms that refer to the concept of tacit knowledge and its References, including the oral messages addressed to humans from Allah Almighty that are transmitted by the messengers to them and include the teachings of Allah. And terms of news, science and perception that show the reality of some things, the environment and their understanding, and the conditions of Muslims and nations, past and present.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2016
Journal Name
International Journal Of Pure And Apllied Mathematics
A SEMI ANALYTICAL ITERATIVE TECHNIQUE FOR SOLVING DUFFING EQUATIONS
...Show More Authors

View Publication
Crossref (11)
Crossref
Publication Date
Thu Mar 04 2021
Journal Name
Journal Of Craniofacial Surgery
Outcome Assessment for Surgical Reconstruction of Mandibular Continuity Defects
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Oct 15 2023
Journal Name
Journal Of Yarmouk
Artificial Intelligence Techniques for Colon Cancer Detection: A Review
...Show More Authors

Publication Date
Fri Nov 11 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Analytical Methods for Determination of Ketoprofen Drug: A review
...Show More Authors

Ketoprofen has recently been proven to offer therapeutic potential in preventing cancers such as colorectal and lung tumors, as well as in treating neurological illnesses. The goal of this review is to show the methods that have been used for determining ketoprofen in pharmaceutical formulations. Precision product quality control is crucial to confirm the composition of the drugs in pharmaceutical use. Several analytical techniques, including chromatographic and spectroscopic methods, have been used for determining ketoprofen in different sample forms such as a tablet, capsule, ampoule, gel, and human plasma. The limit of detection of ketoprofen was 0.1 ng/ ml using liquid chromatography with tandem mass spectrometry, while it was 0

... Show More
Publication Date
Mon Jan 02 2017
Journal Name
European Journal Of Scientific Research
Fast approach for arabic text encryption using genetic algorithm
...Show More Authors

As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res

... Show More
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Computational And Theoretical Nanoscience
Three-Dimensional Seismic Response Analysis for a Rockfill Dam
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Solid State Technology
Forecasting Crop Coefficient Values for Cucumber Plant (Cucumis sativus)
...Show More Authors

In this study predication of crop coefficient (Kc) values through growing season for cucumber plant was conducted. A field experiment was carried out at AL Yusufiyah Township, in the Governorate of Baghdad, (latitude: 33°09' N, longitude: 44°24' E, and altitude: 34 m) in medium loam soil. The plant was cultivated inside the greenhouse under subsurface trickle irrigation system with soil water retention technology (SWRT) during the growing season 2017. Crop coefficient values were guessed from the direct method of measurements of daily crop evapotranspiration, while reference evapotranspiration was obtained from Agricultural Meteorology Project - Station of Baghdad - Abu-Ghraib.  The obtained results were showed that crop coeffici

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2017
Journal Name
25th Gis Research Uk Conference
VGI data collection for supplementing official land administration systems
...Show More Authors

This article explores the process of VGI collection by assessing the relative usability and accuracy of a range of different methods (Smartphone GPS, Tablet, and analogue maps) for data collection amongst different demographic and educational groups, and in different geographical contexts. Assessments are made of positional accuracy, completeness, and data collectors’ experiences with reference to the official cadastral data and the administration system in a case-study region of Iraq. Ownership data was validated by crowd agreement. The result shows that successful VGI projects have access to varying data collection methods.

Publication Date
Sat Sep 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Zernike Polynomiales· for Opticl Ssytew. With Borizantal Recta_nguJar Aperture
...Show More Authors

For  small   aberrations,  the  Â·suehl'  ratio of  an . im i'ng syStem

  • depends on trne aberration v·ariance. Its· aberration fu.nct1on ·is e:qJanded in terms 9f-l nike polynomials. which are_ oirrh6goilal over a circular apeltitte. Their advane Uejn the    f;:l t tbat they call be icl.eritified. witl·c1a:s.sh::aj. abe,ttati{)ns 'balanced to jield  minimum varia,.o_q,and

thuS maximum St:rehl  t"a;tio. [n r«enr pap-er, we derived Cl<lse4 .fonn or

Zmike   polyhotnials  that  ate  orthonormal  over "- horizontal rect'angul'ar pupil'. (p.anil.lel to· the >Htxi.es) with ar'€

... Show More
View Publication Preview PDF