Each school of Islamic jurisprudence has principles and rules upon which the diligent work in these schools is based. This is due to the view of sanctification of these rulings, as they are divine rulings. Therefore, the goal is to reach a ruling that represents the intent of the legislator as much as possible.
Hence, these schools of thought established rules for issuing fatwas with the intention of restricting the performance of a fatwa to the hands of those who are qualified for it and have met its conditions, so they gave priority to the most knowledgeable person over others to perform the fatwa. In the Hanafi school of thought, for example, the saying of Imam Abu Hanifa (may God have mercy on him) is given precedence over others,
The aim of this research is to compare traditional and modern methods to obtain the optimal solution using dynamic programming and intelligent algorithms to solve the problems of project management.
It shows the possible ways in which these problems can be addressed, drawing on a schedule of interrelated and sequential activities And clarifies the relationships between the activities to determine the beginning and end of each activity and determine the duration and cost of the total project and estimate the times used by each activity and determine the objectives sought by the project through planning, implementation and monitoring to maintain the budget assessed
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreBackground: Glass ionomer restorations are widely employed in the field of pediatric dentistry. There is a constant demand for a durable restoration that remains functional until exfoliation. This study aimed to measure and compare the effect of a novel coating material (EQUIA Forte Coat) on the microleakage of glass hybrid restoration (EQUIA Forte HT) in primary teeth. Material and method: Thirty cavitated (class-II) primary molars were allocated randomly into two groups based on the coat application; uncoated (control) and coated group (experimental). Cavities were prepared by the use of a ceramic bur (CeraBur) and restored with EQUIA Forte HT with or without applying a protective coat (EQUIA Forte Coat). Samples went through the
... Show MoreBackground: Glass ionomer restorations are widely employed in the field of pediatric dentistry. There is a constant demand for a durable restoration that remains functional until exfoliation. This study aimed to measure and compare the effect of a novel coating material (EQUIA Forte Coat) on the microleakage of glass hybrid restoration (EQUIA Forte HT) in primary teeth. Material and method: Thirty cavitated (class-II) primary molars were allocated randomly into two groups based on the coat application; uncoated (control) and coated group (experimental). Cavities were prepared by the use of a ceramic bur (CeraBur) and restored with EQUIA Forte HT with or without applying a protective coat (EQUIA Forte Coat). Samples went through the therm
... Show MoreThis study aims to improve the quality of satellites signals in addition to increase accuracy level delivered from handheld GPS data by building up a program to read and decode data of handheld GPS. Where, the NMEA protocol file, which stands for the National Marine Electronics Association, was generated from handheld GPS receivers in real time using in-house design program. The NMEA protocol file provides ability to choose points positions with best status level of satellites such as number of visible satellite, satellite geometry, and GPS mode, which are defined as accuracy factors. In addition to fix signal quality, least squares technique was adopted in this study to minimize the residuals of GPS observations and enh
... Show MoreRecently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding
... Show More