This study aimed to review the aesthetic miracle in the story of Yusuf, peace be upon him, with the Al-Azeez’s wife, using the historical, descriptive and analytical approaches. The study sample was determined in the verses (30-34) of the Holy Quran. The study found that the beauty of Yusuf, peace be upon him, went beyond the four stages and steps of the aesthetic judgment that Feldman set, in which Yusuf’s beauty is nothing but a divine miracle that cannot be described, analyzed, and interpreted. Also despite the various concepts of beauty dealt with by ancient Greek philosophers such as the Pythagoreans, Socrates, Plato and Aristotle; and modern philosophers such as Descartes, Diderot, Kant, Hegel, and Schopenhauer are embodied in the story. The results also showed the fulfillment of the four principles of John Dewey's philosophy of aesthetic experience in the story of Yusuf, peace be upon him, with Al-Azeez wife.
Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t
... Show MoreThis paper presents a robust control method for the trajectory control of the robotic manipulator. The standard Computed Torque Control (CTC) is an important method in the robotic control systems but its not robust to system uncertainty and external disturbance. The proposed method overcome the system uncertainty and external disturbance problems. In this paper, a robustification term has been added to the standard CTC. The stability of the proposed control method is approved by the Lyapunov stability theorem. The performance of the presented controller is tested by MATLAB-Simulink environment and is compared with different control methods to illustrate its robustness and performance.
An automatic text summarization system mimics how humans summarize by picking the most significant sentences in a source text. However, the complexities of the Arabic language have become challenging to obtain information quickly and effectively. The main disadvantage of the traditional approaches is that they are strictly constrained (especially for the Arabic language) by the accuracy of sentence feature functions, weighting schemes, and similarity calculations. On the other hand, the meta-heuristic search approaches have a feature tha
... Show Moreتعد التنمية المستدامة حق للكل البشرية وانها تهدف لتطوير المجتمعات البشرية من كافة النواحي وبشكل دائم وهي تهدف في القضاء على الفقر والجوع وهذه الظاهر ظاهرة منتشرة في العراق اذ ان المواطنين فيه يعشون في حالات تفرقة ودائما هم في حالات حروب اويعيشون في حصار اقتصادي او في اوقات كثيرة يعشون باوقات ازمات مما يجعلهم في فقر دوري ارض لتطبيق هدف التنمية المستدامة الذي ينص على القضاء على ،
In linear regression, an outlier is an observation with large residual. In other words, it is an observation whose dependent-variable value is unusual given its values on the predictor variables. An outlier observation may indicate a data entry error or other problem.
An observation with an extreme value on a predictor variable is a point with high leverage. Leverage is a measure of how far an independent variable deviates from its mean. These leverage points can have an effect on the estimate of regression coefficients.
Robust estimation for regression parameters deals with cases that have very high leverage, and cases that are outliers. Robust estimation is essentially a
... Show MoreThe widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.
The present paper puts forward an enhancement for the throughput performance metric by p
... Show Morea laser ablation Q-switched Nd: YAG laser with a wave-length of 355 nm at a variety of laser pulse energies (E) and deposited on porous silicon (PS). Optical emission spectrometer was used to diagnosed medium air to study gold plasma characteristics and prepared Au nanoparticles. The laser pulse energy influence has been studied on the plasma characteristics in air. The data showed the emergence of the ionic (Au II) spectral emission lines in the gold plasma emission spectrum. XRD has been utilized to examine structural characteristics. Moreover, AFM results 37.2 nm as the mean value of the diameter that is coordinated in a shape similar to the rod that appears for Au NPs, in addition to that, TEM has been an indication of the fact that syn
... Show MoreThe current study aimed the syntheses and characterizations of Gold nanoparticles (Au NPs) using a laser ablation Q-switched Nd: YAG laser with a wave-length of 355 nm at a variety of laser pulse energies (E) and deposited on porous silicon (PS). Optical emission spectrometer was used to diagnosed medium air to study gold plasma characteristics and prepared Au nanoparticles. The laser pulse energy influence has been studied on the plasma characteristics in air. The data showed the emergence of the ionic (Au II) spectral emission lines in the gold plasma emission spectrum. XRD has been utilized to examine structural characteristics. Moreover, AFM results 37.2 nm as the mean value of the diameter that is coordinated in a shape similar to the
... Show More