Preferred Language
Articles
/
jcois-1163
The most important and important rule in the Quranic perspective "An applied study"
...Show More Authors

Abstract

    All of us are indispensable for this rule (the most important and important) individuals, whether we were groups of leaders or followers of peoples or countries because the rule provides adequate guarantees for the correct positions and drawing the plan for successful decision-makers matching with the balances of Sharia without incompatibility between religious or worldly interests or legal positions and therefore in the framework of the most important appointment And distinguish it from the important from the interests or the appointment of the most important and distinguish from the important from the evils and through this rule we learn about the scientific and practical solutions that the Holy Street sets through the Holy Qur’an that he puts in our hands to deal with the impulsion between the interests and the corrupt that the people do not live from in their personal and societal dimensions. This rule is sometimes located in political, economic, and security affairs, and in the affairs of the state administration, which guarantees the interest of all parties. The Muslim jurists differed in the issues that are not stipulated. That is on (measurement, desirability, sent interests, opening and closing excuses, etc.). Finally, this rule differed in the books of the team. Each team defends its freshness, reviewing mental and psychological evidence, but the researcher has relied on some Quranic verses indicating the subject as mentioned in the research.

Researcher

Key words: the most important and important rule, the Quranic perspective, an applied study.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Nov 19 2020
Journal Name
Indonesian Journal Of Chemistry
Determination of Eugenol in Personal-Care Products by Dispersive Liquid-Liquid Microextraction Followed by Spectrophotometry Using <i>p</i>-Amino-<i>N,N</i>-dimethylaniline as a Derivatizing Agent
...Show More Authors

Two simple methods for the determination of eugenol were developed. The first depends on the oxidative coupling of eugenol with p-amino-N,N-dimethylaniline (PADA) in the presence of K3[Fe(CN)6]. A linear regression calibration plot for eugenol was constructed at 600 nm, within a concentration range of 0.25-2.50 μg.mL–1 and a correlation coefficient (r) value of 0.9988. The limits of detection (LOD) and quantitation (LOQ) were 0.086 and 0.284 μg.mL–1, respectively. The second method is based on the dispersive liquid-liquid microextraction of the derivatized oxidative coupling product of eugenol with PADA. Under the optimized extraction procedure, the extracted colored product was determined spectrophotometrically at 618 nm. A l

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Block Ciphers Analysis Based on a Fully Connected Neural Network
...Show More Authors

With the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Dec 06 2015
Journal Name
Baghdad Science Journal
New Operational Matrices of Seventh Degree Orthonormal Bernstein Polynomials
...Show More Authors

Based on analyzing the properties of Bernstein polynomials, the extended orthonormal Bernstein polynomials, defined on the interval [0, 1] for n=7 is achieved. Another method for computing operational matrices of derivative and integration D_b and R_(n+1)^B respectively is presented. Also the result of the proposed method is compared with true answers to show the convergence and advantages of the new method.

View Publication Preview PDF
Crossref
Publication Date
Thu Jan 02 2020
Journal Name
Arab Science Heritage Journal
الظاهرة اللغوية بين الوص ف والتفسير أث ر المفاهي م الكل ي ة في التوفيق بين الاتجاهين العقلاني والطبيعي في دراس ة اللغ ة البشرية
...Show More Authors

This research investigates modern linguistics in terms of the “universality” concept, through which linguistics shifted its attention from the description of the phenomenon into finding an interpretation of it. Then it investigates what needs interpretation in the language

View Publication Preview PDF
Publication Date
Thu Jan 02 2020
Journal Name
Arab Science Heritage Journal
الظاهرة اللغوية بين الوص ف والتفسير أث ر المفاهي م الكل ي ة في التوفيق بين الاتجاهين العقلاني والطبيعي في دراس ة اللغ ة البشرية
...Show More Authors

This research investigates modern linguistics in terms of the “universality” concept, through which linguistics shifted its attention from the description of the phenomenon into finding an interpretation of it. Then it investigates what needs interpretation in the language

View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Detecting Textual Propaganda Using Machine Learning Techniques
...Show More Authors

Social Networking has dominated the whole world by providing a platform of information dissemination. Usually people share information without knowing its truthfulness. Nowadays Social Networks are used for gaining influence in many fields like in elections, advertisements etc. It is not surprising that social media has become a weapon for manipulating sentiments by spreading disinformation.  Propaganda is one of the systematic and deliberate attempts used for influencing people for the political, religious gains. In this research paper, efforts were made to classify Propagandist text from Non-Propagandist text using supervised machine learning algorithms. Data was collected from the news sources from July 2018-August 2018. After annota

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Thu Mar 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
السياسة الضريبية المحلية في ظل العولمة ( مع إشارة خاصة لالسياسة الضريبية المحلية في ظل العولمة ( مع إشارة خاصة لبلدان جنوب شرق آسيا)بلدان جنوب شرق آسيا)
...Show More Authors

تركت العولمة المتسارعة أثرا عميقا على مدى واسع من السياسات والتطبيقات الاقتصادية في كل من الدول النامية والمتقدمة على حد سواء, إذ نشأت الأنظمة الضريبية الحالية عندما نمّط كل بلد سياسته الضريبية بشكل تركز معه على متطلبات الاقتصاد المحلي, وعندما كانت تعقد المفاوضات بين الأمم المختلفة حول المعاملات الضريبية والاتفاقات الضريبية كانت تجري في إطار من هيمنة السياسة الضريبية المحلية.

لكن العولم

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
ستراتيجيات ردم الفجوة الرقمية في دول الاسكوا – مع إشارة خاصة للعراق-
...Show More Authors

إن التغيرات السريعة والبعيدة المدى في تكنولوجيا المعلومات القائمة على أساس الالكترونيات الدقيقة تساعد في حدوث تحول في صورة الاقتصاد العالمي، وكذلك تساعد في تغيير المزايا التنافسية للبلدان، وربط المؤسسات البعيدة ببعضها البعض، ونشر الخدمات المالية على نطاق عالمي، وكذلك إثارة مشكلات جديدة او العكس فتح فرص جديدة أمام تنمية ونمو أفقر البلدان .

وأدت هذه التكنولوجيا الجديد

... Show More
View Publication Preview PDF
Crossref