Praise be to God, Lord of the worlds, and prayers and peace be upon His messenger, the mercy of the worlds.
As for after ....
It is clear from the legal texts in the Noble Qur’an and the Sunnah of the Prophet, that Islam is a method that interferes in everything in beliefs, worship, behavior and transactions, and it forbids excess and extremism and mistrust of people and looking at them through a black lens, self-conceit and contempt of others.
In our research, we will try, God willing, to study the phenomenon of religious extremism with its comprehensive dimensions, the position of Islam on it through the verses and hadiths discussed by it, and the diagnosis of the reasons for its emergence and emergence, because if we learn
Were not experience Khalil Hawi capillary module as presented or routine in the format
of the implications , but was saturated transitions quality that targeted built by visionary and
mechanisms expressive , Valgosaidp when the container is a clash between two worlds world
Nahdi to promote world on the ashes , and often strained poet himself to achieve an approach
between worlds , and in the midst of those caesarean section exhausted poet in touch his tools
and visions , and this is why the poetry Hawi toward westernization expressive as a result of
the conflict concepts chronic , be sure to researcher not engaged in the overall qualitative
changes in the structure and content, but the goal Acetknah level that qualit
Throughout the ages,the methods of human production, exchange, and communication have not changed,and lifestyles have not witnessed rapid and comprehensive changes except since the presence of advanced and modern technologies for information and communication, which led to the emergence of new patterns of intellectual works and innovations that are dealt with and circulated through the virtual medium.These innovations are in many legal disputes, and domain names are one of the most important foundations of information networks, as they are the key to entering the virtual world and distinguishing websites. Because of the novelty of domain names,many attacks have occurred on them, which are closely related to intellectual property rights. And
... Show MoreThe most important issue that 21-century in knowledge organization try successfully to face and solve is the determination of the ways and the processes through which they can measure and assess the intellectual capital (IC). In spite of the importance of the human capital in the knowledge organization, The accounting as an information systems, does not give a great deal of consideration to the human capital, and does not treat investment in it as an original factor, but it shows it on the base of salaries and payrolls that is appears in the financial statements as a revenue expenditure. As a result of that the financial statement are not a true expression of the actual status and then some of the decisions taken under the present circum
... Show More<p>Energy and memory limitations are considerable constraints of sensor nodes in wireless sensor networks (WSNs). The limited energy supplied to network nodes causes WSNs to face crucial functional limitations. Therefore, the problem of limited energy resource on sensor nodes can only be addressed by using them efficiently. In this research work, an energy-balancing routing scheme for in-network data aggregation is presented. This scheme is referred to as Energy-aware and load-Balancing Routing scheme for Data Aggregation (hereinafter referred to as EBR-DA). The EBRDA aims to provide an energy efficient multiple-hop routing to the destination on the basis of the quality of the links between the source and destination. In
... Show MoreElectronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show MoreThe rise of Industry 4.0 and smart manufacturing has highlighted the importance of utilizing intelligent manufacturing techniques, tools, and methods, including predictive maintenance. This feature allows for the early identification of potential issues with machinery, preventing them from reaching critical stages. This paper proposes an intelligent predictive maintenance system for industrial equipment monitoring. The system integrates Industrial IoT, MQTT messaging and machine learning algorithms. Vibration, current and temperature sensors collect real-time data from electrical motors which is analyzed using five ML models to detect anomalies and predict failures, enabling proactive maintenance. The MQTT protocol is used for efficient com
... Show More