Do’a and Zikr al-Mā’thur (authentic supplications and remembrance of ALLAH ‘Azza wa Jalla) can be suggested to Muslims to help them deal with challenges or issues in life. Counselling cases affect a person’s feelings. Do’a and Zikr al-Mā’thur are often applied as a counselling intervention. Unfortunately, the authentic Do’a and Zikr al-Mā’thur are dispersed in many resources not visible to users, and the fact that not all online resources offer access to accurate Do’a and Zikr al-Mā’thur to users and the dubious Do’a and Zikr al-Mā’thur frequently credited to the Prophet (pbuh). The goal of this research is to develop an ontology for the purpose of providing credible results to counselling cases in need of relevant Do’a and Zikr Al- Ma’thur. This research focused on presenting how an ontology could support to provide accurate information to cases supervised by high school counsellors. This research developed the ontology for Do’a and Zikr al-Mā’thur for counselling in Protégé. The methodology implemented in the ontology development included the models designed by Fernandez-Lopez et al., Thunkijjanukij, Gomez-Perez et al., and Kreider. The ontology was verified, validated, and evaluated by two subject domain experts. Most concepts were rated as ‘Compliant’ and some as ‘Partially Compliant’. Queries in SPARQL produced answers to the competency questions. Feedbacks from the user assessment proved that the executed results from the Do’a and Zikr al-Mā’thur ontology for counselling succeeded in fulfilling the users’ requirement. It is recommended that the sustainability of the ontology should be secured through constant submission of real cases by counsellors and people with similar roles for query analysis and results. Credible scholars should provide direction to trustworthy sources. Such essential input is valuable for content management and contributes towards very few domain ontologies that deliver support to professional works. It also provides the step-by-step procedures to ontology construction and assessment for Islamic collection for counselling intervention.
The differential protection of power transformers appears to be more difficult than any type of protection for any other part or element in a power system. Such difficulties arise from the existence of the magnetizing inrush phenomenon. Therefore, it is necessary to recognize between inrush current and the current arise from internal faults. In this paper, two approaches based on wavelet packet transform (WPT) and S-transform (ST) are applied to recognize different types of currents following in the transformer. In WPT approach, the selection of optimal mother wavelet and the optimal number of resolution is carried out using minimum description length (MDL) criteria before taking the decision for the extraction features from the WPT tree
... Show MoreKeys to four genera and twelve species of the subfamily Phlaeothripinae (Phlaeothripidae) were constructed, these are: Haplothrips; Karnyothrips; Phlaeothrips; and Dolicholepta ,and the species are: Haplothrips cerealis Priesner; Haplothrips tritici kurdjumov, Haplothrips hukkineni Priesner; Haplothrips subtilissimus (Haliday) ؛ Haplothrips reuteri Karny; Haplothrips jasonis Priesner; Haplothrips sallloumensis Priesner ; Haplothrips pharao Priesner ; Phlaeothrips sycomri Priesner ; Karnyothrips flavipus (Jones); Karnyothrips melaleucus (Bagnall) ; Dolicholepta micrurus (Bagnall). These were collected from Baghdad
... Show MorePing message focused on highlighting the fact commodity trading in Iraq, and increased exposure to world merchandise trade imbalance, which dominate Iraq's foreign trade major commodity is oil, and therefore the inability of Iraq to control financial revenue as a result of the fluctuations in the international market, the shortage of commodity products will lead inevitably to the weakness in the ability of the local market to meet the internal demand and due to the lack of flexible production machine For agricultural, industrial and economic sectors are responding to changes in the domestic or external demand which will open the door to merchandise imports to invade these markets, since the adoption of the Iraq oil exports,
... Show MoreHygienic engineering has dedicated a lot of time and energy to studying water filtration because of how important it is to human health. Thorough familiarity with the filtration process is essential for the design engineer to keep up with and profit from advances in filtering technology and equipment as the properties of raw water continue to change. Because it removes sediment, chemicals, odors, and microbes, filtration is an integral part of the water purification process. The most popular technique for treating surface water for municipal water supply is considered fast sand filtration, which can be achieved using either gravity or pressure sand filters. Predicting the performance of units in water treatment plants is
... Show MoreA demonstration of the inverse kinematics is a very complex problem for redundant robot manipulator. This paper presents the solution of inverse kinematics for one of redundant robots manipulator (three link robot) by combing of two intelligent algorithms GA (Genetic Algorithm) and NN (Neural Network). The inputs are position and orientation of three link robot. These inputs are entering to Back Propagation Neural Network (BPNN). The weights of BPNN are optimized using continuous GA. The (Mean Square Error) MSE is also computed between the estimated and desired outputs of joint angles. In this paper, the fitness function in GA is proposed. The sinwave and circular for three link robot end effecter and desired trajectories are simulated b
... Show MorePartial shading is one of the problems that affects the power production and the efficiency of photovoltaic module. A series of experimental work have been done of partial shading of monocrystalline PV module; 50W, Isc: 3.1A, Voc: 22V with 36 cells in series is achieved. Non-linear power output responses of the module are observed by applying various cases of partial shading (vertical and horizontal shading of solar cells in the module). Shading a single cell (corner cell) has the greatest impact on output energy. Horizontal shading or vertical shading reduced the power from 41W to 18W at constant solar radiation 1000W/m2 and steady state condition. Vertical blocking a column
... Show MoreIn this paper, point estimation for parameter ? of Maxwell-Boltzmann distribution has been investigated by using simulation technique, to estimate the parameter by two sections methods; the first section includes Non-Bayesian estimation methods, such as (Maximum Likelihood estimator method, and Moment estimator method), while the second section includes standard Bayesian estimation method, using two different priors (Inverse Chi-Square and Jeffrey) such as (standard Bayes estimator, and Bayes estimator based on Jeffrey's prior). Comparisons among these methods were made by employing mean square error measure. Simulation technique for different sample sizes has been used to compare between these methods.
Nowadays, the robotic arm is fast becoming the most popular robotic form used in the industry among others. Therefore, the issues regarding remote monitoring and controlling system are very important, which measures different environmental parameters at a distance away from the room and sets various condition for a desired environment through a wireless communication system operated from a central room. Thus, it is crucial to create a programming system which can control the movement of each part of the industrial robot in order to ensure it functions properly. EDARM ED-7100 is one of the simplest models of the robotic arm, which has a manual controller to control the movement of the robotic arm. In order to improve this control s
... Show MoreTo perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim
... Show More