Preferred Language
Articles
/
4hZe34sBVTCNdQwC7eLw
References for Receiving Explicit and Implicit Knowledge in the Holy Quran
...Show More Authors

The research aims to explain the References of receiving the explicit and implicit knowledge mentioned in the Noble Qur'an. The two researchers adopted the documentary and inductive approach to study the topic. Among the conclusions of the research: The Noble Qur'an dealt with many terms and concepts that refer to the References of making explicit knowledge available, including books, which were represented by the divine books (the Qur'an, the Torah, the Zabur and the Gospel) and their concepts (the book, the Qur'an, the guidance, the remembrance, the revelation, the light, the newspapers, the plates). He dealt with many concepts that refer to the References of providing tacit knowledge, which was represented by the communication between two or more persons, whether between Allah Almighty and humans or between human beings themselves, which were represented by speech, dialogue, communication, consultation, or discourse on a specific topic. And terms that refer to the concept of tacit knowledge and its References, including the oral messages addressed to humans from Allah Almighty that are transmitted by the messengers to them and include the teachings of Allah. And terms of news, science and perception that show the reality of some things, the environment and their understanding, and the conditions of Muslims and nations, past and present.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Calibration and verification of the hydraulic model for Blue Nile river from Roseires dam to Khartoum city
...Show More Authors

This research represents a practical attempt applied to calibrate and verify a hydraulic model for the Blue Nile River. The calibration procedures are performed using the observed data for a previous period and comparing them with the calibration results while verification requirements are achieved with the application of the observed data for another future period and comparing them with the verification results. The study objective covered a relationship of the river terrain with the distance between the assumed points of the dam failures along the river length. The computed model values and the observed data should conform to the theoretical analysis and the overall verification performance of the model by comparing it with anothe

... Show More
Publication Date
Fri May 17 2013
Journal Name
International Journal Of Computer Applications
Applied Minimized Matrix Size Algorithm on the Transformed Images by DCT and DWT used for Image Compression
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Comparison of Mercury Intrusion and Nitrogen Adsorption Measurements for the Characterization of Certain Natural Raw Materials Deposits
...Show More Authors

The porosity of materials is important in many applications, products and processes, such as electrochemical devices (electrodes, separator, active components in batteries), porous thin film, ceramics, soils, construction materials, ..etc. This can be characterized in many different methods, and the most important methods for industrial purposes are the N2 gas adsorption and mercury porosimetry. In the present paper, both of these techniques have been used to characterize some of Iraqi natural raw materials deposits. These are Glass Sand, Standard Sand, Flint Clay and Bentonite. Data from both analyses on the different types of natural raw materials deposits are critically examined and discussed. The results of specific surface are

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Electronics,computer Networking And Applied Mathematics
Comparison of Some Estimator Methods of Regression Mixed Model for the Multilinearity Problem and High – Dimensional Data
...Show More Authors

In order to obtain a mixed model with high significance and accurate alertness, it is necessary to search for the method that performs the task of selecting the most important variables to be included in the model, especially when the data under study suffers from the problem of multicollinearity as well as the problem of high dimensions. The research aims to compare some methods of choosing the explanatory variables and the estimation of the parameters of the regression model, which are Bayesian Ridge Regression (unbiased) and the adaptive Lasso regression model, using simulation. MSE was used to compare the methods.

View Publication
Crossref
Publication Date
Sun Dec 05 2010
Journal Name
Baghdad Science Journal
Pre-Test Single and Double Stage Shrunken Estimators for the Mean of Normal Distribution with Known Variance
...Show More Authors

This paper is concerned with pre-test single and double stage shrunken estimators for the mean (?) of normal distribution when a prior estimate (?0) of the actule value (?) is available, using specifying shrinkage weight factors ?(?) as well as pre-test region (R). Expressions for the Bias [B(?)], mean squared error [MSE(?)], Efficiency [EFF(?)] and Expected sample size [E(n/?)] of proposed estimators are derived. Numerical results and conclusions are drawn about selection different constants included in these expressions. Comparisons between suggested estimators, with respect to classical estimators in the sense of Bias and Relative Efficiency, are given. Furthermore, comparisons with the earlier existing works are drawn.

View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (22)
Crossref (10)
Scopus Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Improving the Performance of Constructed Wetland Microbial Fuel Cell (CW- MFC) for Wastewater Treatment and Electricity Generation
...Show More Authors

The current study deals with the performance of constructed wetland (CW) incorporating a microbial fuel cell (MFC) for wastewater treatment and electricity generation. The whole unit is referred to as CW-MFC. This technique involves two treatments; the first is an aerobic treatment which occurs in the upper layer of the system (cathode section) and the second is anaerobic biological treatment in the lower layer of the system (anode section). Two types of electrode material were tested; stainless steel and graphite. Three configurations for electrodes arrangement CW-MFC were used. In the first unit of CW-MFC, the anode was graphite plate (GPa) and cathode was also graphite plate (GPc), in the second CW-MFC unit, the anode was stainless st

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sat Jun 01 2013
Journal Name
Int. J. Nanoelectronics And Materials
Comparsion of the physical properties for CdS and CdS doped PVA thin films prepared by spray pyrolysis
...Show More Authors

Preview PDF
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
mathematical model for segmentation of the overall planning of puplic redemption company- ministry of industry and minerals
...Show More Authors

Abstract

The study presents a mathematical model with a disaggregating approach to the problem of production planning of a fida Company; which belongs to the ministry of Industry. The study considers disaggregating the entire production into 3 productive families of (hydraulic cylinders, Aldblatt (dampers), connections hydraulics with each holds similar characteristics in terms of the installation cost, production time and stock cost. The Consequences are an ultimate use of the available production capacity as well as meeting the requirements of these families at a minimal cost using linear programming. Moreover, the study considers developing a Master production schedule that drives detailed material and production requi

... Show More
View Publication Preview PDF
Crossref