Science occupies great importance in Islamic thought. Science and learning are considered an essential part of Islamic teachings, and this importance appears in several aspects,Among them is thatScience as a means of understanding religion :Science is a means of understanding the teachings of the Islamic religion. Islam encourages thinking and rational research to understand the Holy Quran and the Sunnah of the Prophet, enabling Muslims to direct their lives and actions in accordance with the directives of their religion,And also to encourageResearch :Islam encourages scientific research and the use of reason in understanding the nature of the universe and God’s signs in it. Muslims are encouraged to study the natural and social sciences and all fields that are useful in developing human knowledge. Science and community development :Islam views science as playing a crucial role in the progress and development of society. It encourages the use of science and technology in the service of humanity, in improving living conditions and promoting social and economic progress, science and piety :Islam views science as a means to achieve piety, that is, a close connection with God and living according to His teachings. The search for and acquisition of knowledge is a form of worship, and Islam promotes people’s understanding that achieving knowledge leads to deeper piety, knowledge, and individual and collective excellence. :Islam encourages the pursuit of knowledge and achieving excellence in its field. It glorifies academic achievement and individual and collective skills as means of serving society and making positive contributions, science and justice :Islam promotes the use of science to achieve justice in society. The Islamic religion expects those with knowledge to contribute to serving justice, ensuring the rights of individuals, and achieving balance in society. In Islamic thought, science is linked to religion and lifeAlyumiaIt encourages Muslims to use science as a means to achieve personal well-beingAnd socialAt the same time To serve God and his creation. This is what Imam Al-Ghazali argued in the content of the research, where:Not all knowledge is science. For example, our life experiences do not include direct observation and practical activity, which do not go beyond the pure description of facts and processes, and which do not go beyond monitoring their external aspects only. That Work is all the activities that a person practices, whether physical or mental, with the aim of production in the institution in which he works, whether governmental or private, or the work may be in a personal profession or craft. The concept of work in Islam: Work is everything that brings benefit to the believer, and this benefit may be material, worldly, or moral in the hereafter. Work has great importance and great status in Islam, and through it the Muslim obtains a great reward and reward, as it is considered worship and compliance with the commands of God Almighty, so through it Life flourishes, the country is prospered, and stability is achieved for the individual and society as a whole. Work in Islam is considered a type of jihad for the sake of God, and its goal is not just to collect money, but rather it is an act of worship that brings goodness to the Muslim, and what is required of him is to strive hard in life seeking the doors of sustenance. And to adhere to God’s limits and not disobey His commands, as good deeds are what guarantee a good life and strength for a person.
With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreMany cryptosystems and security techniques use substitution boxes to ensure the data’s secure communication. A new technique is presented for generating a robust S-box to fulfill security requirements. The AES algorithm represents a block cipher cryptographic algorithm. It was selected by the National Institute of Science and Technology as the optimal cryptographic algorithm in 2011. Through the study of the properties of original S-BOX, this algorithm has been subjected to a number of attacks (linear, differential, statistical, and interpolation), and original S-BOX has been static, which makes the attack strong and shows a weakness in the algorithm. It is necessary to make this algorithm more efficient and powerful through
... Show MoreIn this paper, we introduce the concept of Jordan –algebra, special Jordan –algebra and triple –homomorphisms. We also introduce Bi - –derivations and Annihilator of Jordan algebra. Finally, we study the triple –homomorphisms and Bi - –derivations on Jordan algebra.
In the present paper, three reliable iterative methods are given and implemented to solve the 1D, 2D and 3D Fisher’s equation. Daftardar-Jafari method (DJM), Temimi-Ansari method (TAM) and Banach contraction method (BCM) are applied to get the exact and numerical solutions for Fisher's equations. The reliable iterative methods are characterized by many advantages, such as being free of derivatives, overcoming the difficulty arising when calculating the Adomian polynomial boundaries to deal with nonlinear terms in the Adomian decomposition method (ADM), does not request to calculate Lagrange multiplier as in the Variational iteration method (VIM) and there is no need to create a homotopy like in the Homotopy perturbation method (H
... Show MoreAn intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co
... Show MoreA content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a
... Show MoreBackground: diagnostic radiology field workers are at elevated risk level for systemic and oral diseases like periodontal diseases. This study was aimed to estimate the periodontal condition and salivary flow rate among diagnostic radiology workers. Material and method: The sample for this study consisted of a study group radiographers (forty subjects) working for 5 years at least and control group consisted of nurses and laboratory workers away from radiation (forty subjects) in Baghdad hospitals. All the 80 subjects aged 30-40 year-old and looking healthy without systemic diseases. Plaque, gingival, periodontal pocket depth and clinical attachment loss indices were used for recording the periodontal conditions. Under standardized condi
... Show MoreAlthough the Wiener filtering is the optimal tradeoff of inverse filtering and noise smoothing, in the case when the blurring filter is singular, the Wiener filtering actually amplify the noise. This suggests that a denoising step is needed to remove the amplified noise .Wavelet-based denoising scheme provides a natural technique for this purpose .
In this paper a new image restoration scheme is proposed, the scheme contains two separate steps : Fourier-domain inverse filtering and wavelet-domain image denoising. The first stage is Wiener filtering of the input image , the filtered image is inputted to adaptive threshold wavelet
... Show MoreLet Ḿ be a unitary R-module and R is a commutative ring with identity. Our aim in this paper to study the concepts T-ABSO fuzzy ideals, T-ABSO fuzzy submodules and T-ABSO quasi primary fuzzy submodules, also we discuss these concepts in the class of multiplication fuzzy modules and relationships between these concepts. Many new basic properties and characterizations on these concepts are given.