Preferred Language
Articles
/
CBeHh5IBVTCNdQwCnrMh
Prioritise Five Tafseer Translators Using Clustering Technique for Surah Al-Baqarah
...Show More Authors

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 30 2015
Journal Name
College Of Islamic Sciences
Issam al-Din al-Asfrani's footnote On the interpretation of the oval Imam Issam al-Din Ibrahim Arbashah al-Asfrani (Th 159 e)   Surah Al-Baqarah (verse 55-911)
...Show More Authors

Issam al-Din al-Asfrani's footnote
On the interpretation of the oval
Imam
Issam al-Din Ibrahim Arbashah al-Asfrani
(Th 159 e)
  Surah Al-Baqarah (verse 55-911)

View Publication Preview PDF
Publication Date
Wed Apr 10 2019
Journal Name
Engineering, Technology & Applied Science Research
Content Based Image Clustering Technique Using Statistical Features and Genetic Algorithm
...Show More Authors

Text based-image clustering (TBIC) is an insufficient approach for clustering related web images. It is a challenging task to abstract the visual features of images with the support of textual information in a database. In content-based image clustering (CBIC), image data are clustered on the foundation of specific features like texture, colors, boundaries, shapes. In this paper, an effective CBIC) technique is presented, which uses texture and statistical features of the images. The statistical features or moments of colors (mean, skewness, standard deviation, kurtosis, and variance) are extracted from the images. These features are collected in a one dimension array, and then genetic algorithm (GA) is applied for image clustering.

... Show More
View Publication
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Sun Sep 30 2012
Journal Name
College Of Islamic Sciences
Meaning of formulation غ more actions      In Surat Al-Baqarah at the pride of honor
...Show More Authors

Praise be to God, who started his book with the praise of himself and prayers and peace be upon those who do not have a prophet after him and his family and companions and those who followed them with charity until the Day of Judgment. Either:
      The research examines the meanings of the formulas of the increased verbs that were mentioned in Surat Al-Baqara, at the imam of the imams of the Islamic nation, namely, Al-Fakhri Al-Razi (d. 606 AH), may God Almighty have mercy on him. With the imams of Quranic scholars.

View Publication Preview PDF
Publication Date
Sun Oct 06 2024
Journal Name
International Journal Of Advances In Engineering And Management (ijaem)
The makers of sedition in light of Chapters (Al-Baqarah and Yusuf)/An objective study
...Show More Authors

The makers of strife exist in every era and time. They differ in how these temptations are created and the methods used in doing so. In our modern era, they are more; This is due to the presence of information technology and its easy availability at their fingertips, as well as the spread of social networking sites, which are rapidly spreading among ignorant groups and groups that are deficient in their use. Which led the makers of sedition to exploit these matters and create various temptations and spread them among peoples and societies. Today, we cannot predict the future of humanity in light of this huge amount of temptation. What the Holy Qur’an mentioned about the types of temptations in its noble verses and their embodiment in seve

... Show More
Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Wireless Propagation Multipaths using Spectral Clustering and Three-Constraint Affinity Matrix Spectral Clustering
...Show More Authors

This study focused on spectral clustering (SC) and three-constraint affinity matrix spectral clustering (3CAM-SC) to determine the number of clusters and the membership of the clusters of the COST 2100 channel model (C2CM) multipath dataset simultaneously. Various multipath clustering approaches solve only the number of clusters without taking into consideration the membership of clusters. The problem of giving only the number of clusters is that there is no assurance that the membership of the multipath clusters is accurate even though the number of clusters is correct. SC and 3CAM-SC aimed to solve this problem by determining the membership of the clusters. The cluster and the cluster count were then computed through the cluster-wise J

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Feb 16 2022
Journal Name
Journal Of Economics And Administrative Sciences
Solving Resource Allocation Model by Using Dynamic Optimization Technique for Al-Raji Group Companies for Soft Drinks and Juices
...Show More Authors

In this paper, the problem of resource allocation at Al-Raji Company for soft drinks and juices was studied. The company produces several types of tasks to produce juices and soft drinks, which need machines to accomplish these tasks, as it has 6 machines that want to allocate to 4 different tasks to accomplish these tasks. The machines assigned to each task are subject to failure, as these machines are repaired to participate again in the production process. From past records of the company, the probability of failure machines at each task was calculated depending on company data information. Also, the time required for each machine to complete each task was recorded. The aim of this paper is to determine the minimum expected ti

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Hiding the Type of Skin Texture in Mice based on Fuzzy Clustering Technique
...Show More Authors

A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Space Charge Effect for Design Electron Gun Using Five Electrode Immersion Electrostatic Lenses
...Show More Authors

 Computer theoretical study has been carried out on the design of five electrode immersion electrostatic lens used in electron gun application. The finite element method (FEM) is used in the solution of the Poisson's equation fro determine axial potential distribution, the electron trajectory under Zero magnification condition .      The optical  properties : focal length ,spherical and chromatic aberrations are calculated,From studying the properties of the designed electron gun. we have good futures for these  electron gun where are abeam current 4*10-4A    can be supplied by using cathode tip of radius 100 nm.

View Publication Preview PDF
Publication Date
Tue Jan 10 2023
Journal Name
College Of Islamic Sciences
Surah At-Talaq Between Commentators and Jurists
...Show More Authors

Abstract

The Research "Surah At-Talaq between Commentators and Jurists" is summarized in the objectives of the Surah, clarifying the meanings of the verses of the rulings contained therein by mentioning the statements of the commentators, with mentioning the most acceptable of those meanings when a difference arises, explanation of the provisions of the Surah, with a statement of sayings of the  four religious schools of Islamic jurisprudence, in summary, due to the narrowness of the place, and the most acceptable of them.

The research addresses (9) topics, which are: the objectives of Surah At-Talaq, prohibition of divorce during menstruation, testifying retract and divorce, irrevocably divo

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Theoretical And Applied Information Technology
Graph based text representation for document clustering
...Show More Authors

Advances in digital technology and the World Wide Web has led to the increase of digital documents that are used for various purposes such as publishing and digital library. This phenomenon raises awareness for the requirement of effective techniques that can help during the search and retrieval of text. One of the most needed tasks is clustering, which categorizes documents automatically into meaningful groups. Clustering is an important task in data mining and machine learning. The accuracy of clustering depends tightly on the selection of the text representation method. Traditional methods of text representation model documents as bags of words using term-frequency index document frequency (TFIDF). This method ignores the relationship an

... Show More
Preview PDF
Scopus (15)
Scopus