Do’a and Zikr al-Mā’thur (authentic supplications and remembrance of ALLAH ‘Azza wa Jalla) can be suggested to Muslims to help them deal with challenges or issues in life. Counselling cases affect a person’s feelings. Do’a and Zikr al-Mā’thur are often applied as a counselling intervention. Unfortunately, the authentic Do’a and Zikr al-Mā’thur are dispersed in many resources not visible to users, and the fact that not all online resources offer access to accurate Do’a and Zikr al-Mā’thur to users and the dubious Do’a and Zikr al-Mā’thur frequently credited to the Prophet (pbuh). The goal of this research is to develop an ontology for the purpose of providing credible results to counselling cases in need of relevant Do’a and Zikr Al- Ma’thur. This research focused on presenting how an ontology could support to provide accurate information to cases supervised by high school counsellors. This research developed the ontology for Do’a and Zikr al-Mā’thur for counselling in Protégé. The methodology implemented in the ontology development included the models designed by Fernandez-Lopez et al., Thunkijjanukij, Gomez-Perez et al., and Kreider. The ontology was verified, validated, and evaluated by two subject domain experts. Most concepts were rated as ‘Compliant’ and some as ‘Partially Compliant’. Queries in SPARQL produced answers to the competency questions. Feedbacks from the user assessment proved that the executed results from the Do’a and Zikr al-Mā’thur ontology for counselling succeeded in fulfilling the users’ requirement. It is recommended that the sustainability of the ontology should be secured through constant submission of real cases by counsellors and people with similar roles for query analysis and results. Credible scholars should provide direction to trustworthy sources. Such essential input is valuable for content management and contributes towards very few domain ontologies that deliver support to professional works. It also provides the step-by-step procedures to ontology construction and assessment for Islamic collection for counselling intervention.
In the present paper, an eco-epidemiological model consisting of diseased prey consumed by a predator with fear cost, and hunting cooperation property is formulated and studied. It is assumed that the predator doesn’t distinguish between the healthy prey and sick prey and hence it consumed both. The solution’s properties such as existence, uniqueness, positivity, and bounded are discussed. The existence and stability conditions of all possible equilibrium points are studied. The persistence requirements of the proposed system are established. The bifurcation analysis near the non-hyperbolic equilibrium points is investigated. Numerically, some simulations are carried out to validate the main findings and obtain the critical values of th
... Show MoreSegmentation is the process of partition digital images into different parts depending on texture, color, or intensity, and can be used in different fields in order to segment and isolate the area to be partitioned. In this work images of the Moon obtained through observations in Astronomy and space dep. College of science university of Baghdad by ( Toward space telescopes and widespread used of a CCD camera) . Different segmentation methods were used to segment lunar craters. Different celestial objects cause craters when they crash into the surface of the Moon like asteroids and meteorites. Thousands of craters appears on the Moon's surface with ranges in size from meter to many kilometers, it provide insights into the age and ge
... Show MoreThis study investigates the feasibility of a mobile robot navigating and discovering its location in unknown environments, followed by the creation of maps of these navigated environments for future use. First, a real mobile robot named TurtleBot3 Burger was used to achieve the simultaneous localization and mapping (SLAM) technique for a complex environment with 12 obstacles of different sizes based on the Rviz library, which is built on the robot operating system (ROS) booted in Linux. It is possible to control the robot and perform this process remotely by using an Amazon Elastic Compute Cloud (Amazon EC2) instance service. Then, the map to the Amazon Simple Storage Service (Amazon S3) cloud was uploaded. This provides a database
... Show MoreQ fever is an infectious disease of animals and humans, caused by globally distributed C. burnetii. In Iraq, there are no previous studies associated with the detection of the organism in cattle. An overall of 130 lactating cows were submitted to direct collection of milk samples. Initially, the samples of milk were tested using the molecular polymerase chain reaction (PCR) assay targeting three genes (16S rRNA, IS1111a transposase, and htpB). However, positive results (18.46%; 24/130) were detected only with the 16s rRNA gene. Concerning risk factors, the highest prevalence of C. burnetii was showed in the district of Badra (42.86%), whereas the lowest - in Al-Numaniyah and Al-Suwaira districts (P=0.025). There was no significant v
... Show MorePseudomonas aeruginosa, a ubiquitous environmental organism, is a difficult-to-treat opportunistic pathogen due to its broad-spectrum antibiotic resistance and its ability to form biofilms. In this study, we investigate the link between resistance to a clinically important antibiotic, imipenem, and biofilm formation. First, we observed that the laboratory strain P. aeruginosa PAO1 carrying a mutation in the oprD gene, which confers resistance to imipenem, showed a modest reduction in biofilm formation.We also observed an inverse relationship between imipenem resistance and biofilm formation for imipenem-resistant strains selected in vitro, as well as for clinical isolates.We identified two clinical isolates of P. aeruginosa from the sputum
... Show MoreThe aim of this paper is to present a weak form of -light functions by using -open set which is -light function, and to offer new concepts of disconnected spaces and totally disconnected spaces. The relation between them have been studied. Also, a new form of -totally disconnected and inversely -totally disconnected function have been defined, some examples and facts was submitted.
The main target of the current study is to investigate the microbial content and mineral contaminants of the imported meat available in the city of Baghdad and to ensure that it is free from harmful bacteria, safe and it compliances with the Iraqi standard specifications. Some trace mineral elements such as (Iron, Copper, Lead, and Cadmium) were also estimated, where 10 brands of these meats were collected. Bacteriological tests were carried out which included (total bacterial count,
Investigation of mesomorphic properties of new 1,3,4-thiadiazolines (which are synthesised via many steps in Scheme 1) was carried out in this study. These compounds are designed to have a heterocyclic unit, a carboxylate linkage group and a polar ether chain at the end of the molecule adjacent to the benzene ring, which enhance the dipolar interactions forces (varied from one to eight carbons) to investigate the association properties of their phases. The structure of the target compounds and the intermediates were confirmed by 1H NMR, 13C NMR, mass and FTIR spectral techniques. Polarised microscopic studies revealed that all the compounds in the series exhibited enantiotropic liquid crystalline properties. This was further confirmed using
... Show MoreCipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show More