This study aims to apply the theory of "Text from Text and the Plus Dimension" in the analysis of the Prophetic discourse found in the section on the virtues of knowledge and scholars from Imam Sahih al-Bukhari's book. This section covers several topics, including the virtue of gathering for the sake of learning, the superiority of a scholar over a worshipper, the excellence of jurisprudence in the religion of Allah, the acquisition of knowledge through the passing away of scholars, the merit of inviting people to Allah, the continuing benefit of beneficial knowledge after a scholar's demise, the warning against seeking knowledge for purposes other than Allah, and the Prophet seeking refuge from knowledge that brings no benefit. This is an applied analytical study that aims to elucidate the scientific miraculousness in the Prophetic hadiths and explain the meanings of the Prophetic sayings in harmony with scholars and the majority. It also seeks to derive moral lessons from the hadiths and reveal meanings that might be ambiguous or hidden using the "Text from Text and the Plus Dimension" theory in the analysis of the Prophetic discourse. The study arranges the sentences of the hadiths in the section on the virtues of knowledge and scholars from Sahih al-Bukhari's book and examines their meaning and rhetorical composition. It links them with mathematical geometric relationships such as rotation, expansion through magnification and contraction, withdrawal (beginning with the beginning), and reflection (beginning with the end). The study adopts an analytical and explanatory methodology to achieve its objectives, and the corpus of the study consists of Prophetic hadiths from the section on the virtues of knowledge and scholars from Sahih al-Bukhari's book, along with all its topics. This research builds upon two previous studies where the theory was applied to analyze the Prophetic discourse: "Inviting to Contemplate the Prophetic Discourse: Text from Text and the Extra Dimension in the Analysis of the Prophetic Discourse" (Al-Rawajfeh, 2020) and "The Theory of Text from Text and the Extra Dimension in the Analysis and Miraculousness of the Prophetic Discourse: An Application to the Book of Faith from Sahih al-Bukhari" (Al-Rawajfeh and Al-Jubbah, 2023)
Speech recognition is a very important field that can be used in many applications such as controlling to protect area, banking, transaction over telephone network database access service, voice email, investigations, House controlling and management ... etc. Speech recognition systems can be used in two modes: to identify a particular person or to verify a person’s claimed identity. The family speaker recognition is a modern field in the speaker recognition. Many family speakers have similarity in the characteristics and hard to identify between them. Today, the scope of speech recognition is limited to speech collected from cooperative users in real world office environments and without adverse microphone or channel impairments.
Delays occur commonly in construction projects. Assessing the impact of delay is sometimes a contentious
issue. Several delay analysis methods are available but no one method can be universally used over another in
all situations. The selection of the proper analysis method depends upon a variety of factors including
information available, time of analysis, capabilities of the methodology, and time, funds and effort allocated to the analysis. This paper presents computerized schedule analysis programmed that use daily windows analysis method as it recognized one of the most credible methods, and it is one of the few techniques much more likely to be accepted by courts than any other method. A simple case study has been implement
n this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary func
... Show MoreRecently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch
... Show Moreيهدف البحث الى دراسة وتحليل الهندسة المتزامنة (CE) وتحسين التكلفة(CO)، واستعمال مخرجات الهندسة المتزامنة كمدخلات لتحسين التكلفة، وبيان دور الهندسة المتزامنة في تحسين جودة المنتوج، وتحقيق وفورات في وقت التصميم والتصنيع والتجميع وتخفيض التكاليف، فضلاً عن توظيف بعض النماذج لتحديد مقدار الوفورات في الوقت ومنها نموذج(Lexmark) ونموذج (Pert) لتحديد الوفورات في وقت التصميم وقت لتصنيع والتجميع. ولتحقيق اهداف
... Show MoreThe expanding use of multi-processor supercomputers has made a significant impact on the speed and size of many problems. The adaptation of standard Message Passing Interface protocol (MPI) has enabled programmers to write portable and efficient codes across a wide variety of parallel architectures. Sorting is one of the most common operations performed by a computer. Because sorted data are easier to manipulate than randomly ordered data, many algorithms require sorted data. Sorting is of additional importance to parallel computing because of its close relation to the task of routing data among processes, which is an essential part of many parallel algorithms. In this paper, sequential sorting algorithms, the parallel implementation of man
... Show MoreObjective: To evaluate nurses' practices toward coronary artery bypass grafting (CABG) patients in the
intensive care units (ICU) and to find out the relationship with some vanables.
Methodology: A purposive sample of (50) staff nurses was selected out of three hospitals for cardiac surgery.
The study instmment consisted of two major sections was constructed. It is based on the review of literature.
First it is concerned with demographic data for nurses; and the second section is observationaL tool (checklist) is
composed of six parts in which there mere (78) items. Reliability and validity of the observational checklist were
determined through the analysis of a pilot study.
Data were collected through the use of the
In subterranean coal seam gas (CSG) reservoirs, massive amounts of small-sized coal fines are released during the production and development stages, especially during hydraulic fracturing stimulation. These coal fines inevitably cause mechanical pump failure and permeability damage due to aggregation and subsequent pore-throat blockage. This aggregation behavior is thus of key importance in CSG production and needs to be minimized. Consequently, such coal fines dispersions need to be stabilized, which can be achieved by the formulation of improved fracturing fluids. Here, we thus systematically investigated the effectiveness of two additives (ethanol, 0.5 wt % and SDBS, 0.001 and 0.01 wt %) on dispersion stability for a wide range of condit
... Show More