The research aims at the scholars’attention to the importance and role of Arab Muslim women through books and historical studies that historians and scholars have taken up like Ibn Al-Jawzi (597 AH) and his book Safwat Al-Safwa, where he presented the conduct of worship and their words and deeds, and explained to women worshipers other aspects of their lives, such as the scientific aspect Crafts and works as well as their prominent role in preaching and religious guidance, and the impact of this on their morals and qualities. This study showed the strength of the personality of women and their high interest in worship. The importance of the study lies in knowledge.The research followed the role of Muslim women to carry the banner of Arab-Islamic civilization,culture, and preserved human thought.The Islamic community has stood up in pride and honor in front of the Muslim women who are straight and religious, as the leading scholars of preaching and guidance were asking her to preach and remind.Individuals cherished her career, as most of the women’s worshipers ’news came through their husbands, sons, or fathers, which indicates mutual respect, kindness, and love among members of the Muslim family.The researchers committed to documenting information from its sources and following the method of historical research method in investigating and supporting this with tables that count the number of female worshipers in each town.
Idiomatic expressions in Russian journalism make one important borrowed means for making a dialogue with the receiver's intellect in so far as it has the distinct feature of having clarity and exactness of meaning. The meaning is seen as a shortcut for covering a series of concepts and details so as to arrive at the intended meaning. This is done by stimulating the reader by the use of certain clear idioms. The use of such idioms in a journalistic text is not for a linguistic purpose only, but it is a cultural and social phenomenon reflecting the type of current changes in the society and it aims at discoursing with the reader's mind. This paper is a practi
... Show MoreIn this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these
... Show MoreAbstract—The upper limb amputation exerts a significant burden on the amputee, limiting their ability to perform everyday activities, and degrading their quality of life. Amputee patients’ quality of life can be improved if they have natural control over their prosthetic hands. Among the biological signals, most commonly used to predict upper limb motor intentions, surface electromyography (sEMG), and axial acceleration sensor signals are essential components of shoulder-level upper limb prosthetic hand control systems. In this work, a pattern recognition system is proposed to create a plan for categorizing high-level upper limb prostheses in seven various types of shoulder girdle motions. Thus, combining seven feature groups, w
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More