Wisdom is the separation and distinction between aim in the word and work and the lack thereof in accordance with the knowledge surrounding the arts of science, which reached a thorough understanding of things and put them in the quorum. In this research, I have tried to discern the characteristics of the wisdom of Imam Hassan al-Askari (peace be upon him) and to explain his methods and actions which are indicative of the various facets of wisdom required by the nature of the actions and behavior that he has to deal with. Or future mother.
The second topic was devoted to the style of Imam (p) and his wisdom in the situations that necessitated the diversity of methods of dealing such as the method of concealment and the method of reference. .. And the third has been specific to talk about the wisdom of Imam (p) and his outlook for the future outlook and methodology in the prelude to the absence, such as signing the correspondence and send confidential and the absence of sight and agents evidence
The research concludes with the most important findings.
In this work, monitoring of monthly variation (from May 2016 to October 2016) in the concentration of the metals (Co, Zn, Cd, Pb, Ni and Fe) from Al-Diwaniya city of Iraq. Investigation about the pollution with these metals was achieved from five selected sites locate in study area by flame atomic absorption spectroscopy. The results showed a wide variation in the levels of heavy metals from site to site and from month to month. A total of 180 surface soil samples were analyzed to detecting the pollution with selected samples. The resultsshowed that the highest concentration with Ni was 6.290 mg kg-1 while the lowest concentration detected with Ni was 0.080 mg kg-1. The results of pollution index (enrichment factor, contamination factor, po
... Show MoreThe main goal of this research is to determine the impact of some variables that we believe that they are important to cause renal failuredisease by using logistic regression approach.The study includes eight explanatory variables and the response variable represented by (Infected,uninfected).The statistical program SPSS is used to proform the required calculations
User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreIt is from the greatness of God Almighty and from him that he facilitated for me to delve into the immersion of the hadith of the Prophet in my doctoral dissertation, then I found it a fertile ground for the cultivation of scientific results.
Through this work, I chose the topic (Replies of Al-Aini to Ibn Malik in his book Umdat Al-Qari Sharh Sahih Al-Bukhari) because of its scientific impact, as such topics inspire in the soul of the follower and the student a lot of contemplation and great care to understand the texts and then come up with a result that is almost close. It is correct, and my current situation in this research is the condition of many scholars, not without errors and omissions. Whatever was correct is by the grace of
Post-structural critical studies highlighted the importance of studying the texts surrounding the text as an important part in the process of receiving and understanding texts, and although this topic was dealt with by the ancient Arabs and Europeans, interest in it appeared clearly after the appearance of Gerard Genet's book (SEUILS), which separated it Text Thresholds. Or what he called paratexte, and dealt with them with interest as he reads them on books. With the development of semiotic studies, interest in paratexte studies began in a broader way and in various literary and non-literary texts, including journalistic texts. And since specialized magazines are one of the press releases that enjoy their privacy in terms of topics and
... Show MoreUnter Exilliteratur versteht man „die literarische Produktion von Autoren, die wegen politischer, religiöser oder rassistischer Verfolgung gezwungen sind, sich an einem anderen als dem von ihnen gewünschten Lebens- und Arbeitsort aufzuhalten.“[1] Deswegen unterscheidet sich „Migration“ von „Exil“ dadurch, dass sie freiwillige Auswanderung ist. Bereits in der Antike und auch im Mittelalter gab es Schriftsteller, die vor Zensur oder politischer Verfolgung ins Exil geflohen sind, wie zum Beispiel der griechische Satiriker des
... Show MoreIn this paper, an efficient image segmentation scheme is proposed of boundary based & geometric region features as an alternative way of utilizing statistical base only. The test results vary according to partitioning control parameters values and image details or characteristics, with preserving the segmented image edges.
Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show More