Do’a and Zikr al-Mā’thur (authentic supplications and remembrance of ALLAH ‘Azza wa Jalla) can be suggested to Muslims to help them deal with challenges or issues in life. Counselling cases affect a person’s feelings. Do’a and Zikr al-Mā’thur are often applied as a counselling intervention. Unfortunately, the authentic Do’a and Zikr al-Mā’thur are dispersed in many resources not visible to users, and the fact that not all online resources offer access to accurate Do’a and Zikr al-Mā’thur to users and the dubious Do’a and Zikr al-Mā’thur frequently credited to the Prophet (pbuh). The goal of this research is to develop an ontology for the purpose of providing credible results to counselling cases in need of relevant Do’a and Zikr Al- Ma’thur. This research focused on presenting how an ontology could support to provide accurate information to cases supervised by high school counsellors. This research developed the ontology for Do’a and Zikr al-Mā’thur for counselling in Protégé. The methodology implemented in the ontology development included the models designed by Fernandez-Lopez et al., Thunkijjanukij, Gomez-Perez et al., and Kreider. The ontology was verified, validated, and evaluated by two subject domain experts. Most concepts were rated as ‘Compliant’ and some as ‘Partially Compliant’. Queries in SPARQL produced answers to the competency questions. Feedbacks from the user assessment proved that the executed results from the Do’a and Zikr al-Mā’thur ontology for counselling succeeded in fulfilling the users’ requirement. It is recommended that the sustainability of the ontology should be secured through constant submission of real cases by counsellors and people with similar roles for query analysis and results. Credible scholars should provide direction to trustworthy sources. Such essential input is valuable for content management and contributes towards very few domain ontologies that deliver support to professional works. It also provides the step-by-step procedures to ontology construction and assessment for Islamic collection for counselling intervention.
A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
By driven the moment estimator of ARMA (1, 1) and by using the simulation some important notice are founded, From the more notice conclusions that the relation between the sign and moment estimator for ARMA (1, 1) model that is: when the sign is positive means the root gives invertible model and when the sign is negative means the root gives invertible model. An alternative method has been suggested for ARMA (0, 1) model can be suitable when
Experimental and numerical investigations of the centrifugal pump performance at non-cavitating and cavitating flow conditions were carried out in the present study. Experiments were performed by applying a vacuum to a closed-loop system to investigate the effects of the net positive suction head available (NPSHa), flow rate, water temperature and pump speed on the centrifugal pump performance. Accordingly, many of the important parameters concerning cavitation phenomenon were calculated. Also, the noise which is accompanied by cavitation was measured. Numerical analysis was implemented for two phase flow (the water and its vapor) using a 2-D simulation by ANSYS FLUENT software to investigate the internal flow of centrifugal pump under c
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreThe study aims to clarify the truth of hearing the dead, and then the statement of the legitimate judgment of the indoctrination, by reference to the evidence contained in that regard, and try to combine and reconcile those evidence, and the study finds that the most correct in the matter of hearing is to say hearing the dead in the will of God and how Almighty teaches , As up to that indoctrination of the dead is permissible, so as to combine evidence.
Many biochemical and physiological properties depend on the size of ions and the thermodynamic quantities of ion hydration. The diffusion coefficient (D) of lanthanide (III) ions (Ln+3) in solution assumed (1.558-1.618 ×10−9 m2 s−1) by Einstein–Smoluchowski relation. The association constant (KA) of Ln+3 ions was calculated (210.3-215.3 dm3 mole-1) using the Shedlovsky method, and the hydrodynamic radius calculated (1.515-1.569 ×10−10 m) by the Stokes-Einstein equation. The thermodynamic parameters (ΔGo, ΔSo) also calculated by used suitable relations, while ΔHo, values are obtained from the lit
... Show MoreSage (Salvia officinalis), belong to Labiatae family is indigenous to Iraq and other Mediterranean areas but now cultivated world- wide, principally for its use as culinary herb. In the present study preliminary screening for the important phytochemical natural product groups indicated the presence of flavonoid, saponin, hyrolysable and condensed tannin groups. The antibacterial activity of two concentrations 10 mg/ml and 100 mg/ml of chloroform and hydroalcoholic extracts from Salvia officinalis leaves was evaluated against four strains of gram negative bacteria (Escherichia coli, Pseudomonas arigenossa, Klebsiella pneumonia, and Proteus spp) and two str
... Show MoreSimple and sensitive spectrophotometric method is described based on the coupling reaction of tetracycline hydrochloride(TC. HCl) with diazotized 4-aminopyridine in bulk and pharmaceutical forms. Colored azo dye formed during this reaction is measured at 433 nm as a function of time. Factors affecting the reaction yield were studied and the conditions were optimized. The kinetic study involves initial rate and fixed time (10 minutes) procedures for constructing the calibration graphs to determine the concentration of (TC. HCl). The graphs were linear for both methods in concentration range of 10.0 to 100.0 µg.mL-1. The recommended procedure was applied successfully in the determination of (TC. HCl) in itscommercial formulations.
... Show MoreBeen manufacturing detector Altosalih optical pattern contact metal semiconductor through deposition poles of aluminum metal on the chips of crystal cadmium Tleraad (CdTe) with directional [111] and growing with laboratory and annealed at a temperature 80c for 30 minutes and eat Study of some electrical properties nailed and scoutNmadj ??????? copper with non ??????? models to see effect Alichoab well research deals impact Alichoab and frequency detector resistance