Do’a and Zikr al-Mā’thur (authentic supplications and remembrance of ALLAH ‘Azza wa Jalla) can be suggested to Muslims to help them deal with challenges or issues in life. Counselling cases affect a person’s feelings. Do’a and Zikr al-Mā’thur are often applied as a counselling intervention. Unfortunately, the authentic Do’a and Zikr al-Mā’thur are dispersed in many resources not visible to users, and the fact that not all online resources offer access to accurate Do’a and Zikr al-Mā’thur to users and the dubious Do’a and Zikr al-Mā’thur frequently credited to the Prophet (pbuh). The goal of this research is to develop an ontology for the purpose of providing credible results to counselling cases in need of relevant Do’a and Zikr Al- Ma’thur. This research focused on presenting how an ontology could support to provide accurate information to cases supervised by high school counsellors. This research developed the ontology for Do’a and Zikr al-Mā’thur for counselling in Protégé. The methodology implemented in the ontology development included the models designed by Fernandez-Lopez et al., Thunkijjanukij, Gomez-Perez et al., and Kreider. The ontology was verified, validated, and evaluated by two subject domain experts. Most concepts were rated as ‘Compliant’ and some as ‘Partially Compliant’. Queries in SPARQL produced answers to the competency questions. Feedbacks from the user assessment proved that the executed results from the Do’a and Zikr al-Mā’thur ontology for counselling succeeded in fulfilling the users’ requirement. It is recommended that the sustainability of the ontology should be secured through constant submission of real cases by counsellors and people with similar roles for query analysis and results. Credible scholars should provide direction to trustworthy sources. Such essential input is valuable for content management and contributes towards very few domain ontologies that deliver support to professional works. It also provides the step-by-step procedures to ontology construction and assessment for Islamic collection for counselling intervention.
Organizations nowadays, whether public or private organizations, productive or service (such as banks), face major challenges as a result of rapid and continuous changes, and in front of these challenges traditional management operations and tools become unable to make the organization able to work, which makes it imperative for these organizations to follow the methods and management practices, including the proposed knowledge risk management and strategic direction so that it can elevate its actions at the level of developments in reality, in the sense that these organizations and in the light of environmental developments to characterize their strategic direction as an intellectual approach characterized by mo
... Show More
The aim of the research is to identify the effect of instructional design according to Kagan structure among the first intermediate school student’s, and how skills could help in generating information in mathematics. In accordance with the research objectives, the researcher has followed the experimental research method by adopting an experimental design with two equivalent groups of post-test to measure skills in generating information. Accordingly, the researcher raised two main null hypotheses: there were no statistically significant differences at the level of significance (0.05) between the average scores of the experimental group who studied the material according to Kagan structure and th
... Show MoreIn this research, carbon nanotubes (CNTs) is prepared through the Hummers method with a slight change in some of the work steps, thus, a new method has been created for preparing carbon nanotubes which is similar to the original Hummers method that is used to prepare graphene oxide. Then, the suspension carbon nanotubes is transferred to a simple electrode position platform consisting of two electrodes and the cell body for the coating and reduction of the carbon nanotubes on ITO glass which represents the cathode electrode while platinum represents the anode electrode. The deposited layer of carbon nanotubes is examined through the scanning electron microscope technique (SEM), and the images throughout the research show the
... Show MoreThe main objective of this paper is to develop and validate flow injection method, a precise, accurate, simple, economic, low cost and specific turbidimetric method for the quantitative determination of mebeverine hydrochloride (MbH) in pharmaceutical preparations. A homemade NAG Dual & Solo (0-180º) analyser which contains two identical detections units (cell 1 and 2) was applied for turbidity measurements. The developed method was optimized for different chemical and physical parameters such as perception reagent concentrations, aqueous salts solutions, flow rate, the intensity of the sources light, sample volume, mixing coil and purge time. The correlation coefficients (r) of the developed method were 0.9980 and 0.9986 for cell
... Show MoreObjectives: The present study aims at detecting the depression among nurses who provide care for infected patients with corona virus phenomenon and to find out relationships between the depression and their demographic characteristics of age, gender, marital status, type of family, education, and years of experience of nurses in heath institutions, infection by corona virus, and their participation in training courses.
Methodology: A descriptive study is established for a period from October 10th, 2020 to April 15th, 2021. The study is conducted on a purposive (non-probability) sample of (100) nurse who are providing care for patients with COVID-19 and they are selected from the isolation wards. The instrument of the study is develope
The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show MoreIn many oil fields only the BHC logs (borehole compensated sonic tool) are available to provide interval transit time (Δtp), the reciprocal of compressional wave velocity VP.
To calculate the rock elastic or inelastic properties, to detect gas-bearing formations, the shear wave velocity VS is needed. Also VS is useful in fluid identification and matrix mineral identification.
Because of the lack of wells with shear wave velocity data, so many empirical models have been developed to predict the shear wave velocity from compressional wave velocity. Some are mathematical models others used the multiple regression method and neural network technique.
In this study a number of em
... Show MoreIn this research a new system identification algorithm is presented for obtaining an optimal set of mathematical models for system with perturbed coefficients, then this algorithm is applied practically by an “On Line System Identification Circuit”, based on real time speed response data of a permanent magnet DC motor. Such set of mathematical models represents the physical plant against all variation which may exist in its parameters, and forms a strong mathematical foundation for stability and performance analysis in control theory problems.
In our work present, the application of strong-Lensing observations for some gravitational lenses have been adopted to study the geometry of the universe and to explain the physics and the size of the quasars. The first procedure was to study the geometrical of the Lensing system to determine the relation between the redshift of the gravitational observations with its distances. The second procedure was to compare between the angular diameter distances "DA" calculated from the Euclidean case with that from the Freedman models, then evaluating the diameter of the system lens. The results concluded that the phenomena are restricted to the ratio of distance between lens and source with the diameter of the lens noticing.