Preferred Language
Articles
/
jcois-1220
Ruling on conducting a marriage contract through modern means of communication Juristic study
...Show More Authors

 

This research dealt with highlighting the images of marriage through the modern means of communication and the legal ruling for it. Dowry even be knotted on them; because they are then one of the parties to the contract and contracted in one contract, and this is prohibited by law and law and common sense.

It turns out that it is permissible to advertise marriage through the Internet in accordance with the rules and standards that preserve values ​​and morals and safeguard dignity and chastity. The acts in Islamic law are vested with intentions. If intentions are true, then the act is true, and Internet marriage is what falls under this order.

The marriage contract shall also be proved and valid by means of audio communication if the witnesses hear the words of both parties of the positive and acceptance, and it is not true if the witnesses hear the positive without acceptance or vice versa, and it is not valid to do it by writing over the Internet.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 30 2022
Journal Name
Sport Tk-revista Euroamericana De Ciencias Del Deporte
Effect of a training program on the development of physical abilities in football goalkeepers
...Show More Authors

The primary aim of this study was to find out the effect of a training program on the development of physical abilities in football goalkeepers. The current study was conducted on goalkeepers of the Academy of Espanyol Sports Club in the premises of Haifa Sports Club Stadium. The study was completed by the researchers within the timeline of May 2021 to August 2021. A total of 7 goalkeepers falling within the age group of 15-17 years were recruited as the sample participants for the study. Out of 7 goalkeepers, 5 goalkeepers were included in the primary experiment and 2 of them were excluded. The training program applied had a positive effect on the development of physical abilities in the football goalkeepers of the sa

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sun Sep 11 2022
Journal Name
Mathematics
Modeling and Analysis of the Influence of Fear on a Harvested Food Web System
...Show More Authors

The food web is a crucial conceptual tool for understanding the dynamics of energy transfer in an ecosystem, as well as the feeding relationships among species within a community. It also reveals species interactions and community structure. As a result, an ecological food web system with two predators competing for prey while experiencing fear was developed and studied. The properties of the solution of the system were determined, and all potential equilibrium points were identified. The dynamic behavior in their immediate surroundings was examined both locally and globally. The system’s persistence demands were calculated, and all conceivable forms of local bifurcations were investigated. With the aid of MATLAB, a numerical simu

... Show More
View Publication
Scopus (10)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Chemical Sensor Based on a Hollow-Core Photonic Crystal Fiber
...Show More Authors

In this work a chemical sensor was built by using Plane Wave Expansion (PWE) modeling technique by filling the core of 1550 hollow core photonic crystal fiber with chloroform that has different concentrations after being diluted with distilled water. The minimum photonic bandgap width is.0003 and .0005 rad/sec with 19 and 7 cells respectively and a concentration of chloroform that filled these two fibers is 75%.

View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Engineering
A Review on Expansive Soils Stabilized with Different Pozzolanic Materials
...Show More Authors

Soils that cause effective damages to engineer structures (such as pavement and foundation) are called problematic or difficult soils (include collapsible soil, expansive soil, etc.). These damages occur due to poor or unfavorited engineering properties, such as low shear strength, high compressibility, high volume changes, etc. In the case of expansive soil, the problem of the shrink-swell phenomenon, when the soil reacts with water, is more pronounced. To overcome such problems, soils can be treated or stabilized with many stabilization ways (mechanical, chemical, etc.). Such ways can amend the unfavorited soil properties. In this review, the pozzolanic materials have been selected to be presented and discussed as chem

... Show More
View Publication Preview PDF
Crossref (14)
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A survey on bio-signal analysis for human-robot interaction
...Show More Authors

<span lang="EN-US">The use of bio-signals analysis in human-robot interaction is rapidly increasing. There is an urgent demand for it in various applications, including health care, rehabilitation, research, technology, and manufacturing. Despite several state-of-the-art bio-signals analyses in human-robot interaction (HRI) research, it is unclear which one is the best. In this paper, the following topics will be discussed: robotic systems should be given priority in the rehabilitation and aid of amputees and disabled people; second, domains of feature extraction approaches now in use, which are divided into three main sections (time, frequency, and time-frequency). The various domains will be discussed, then a discussion of e

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (4)
Scopus Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
3rd International Scientific Conference Of Alkafeel University (iscku 2021)
Investigations for the critical vehicle velocities on a curved path
...Show More Authors

􀀨􀀅􀀆􀀔􀀜􀀄􀀂􀀆􀀈􀀓􀀌􀀩􀀏􀀆􀀉􀀅􀀆􀀉􀀅􀀉􀀚􀀝􀀔􀀄􀀗􀀉􀀚􀀆􀀂􀀓􀀚􀀁􀀔􀀄􀀓􀀅􀀆􀀄􀀂􀀆􀀔􀀓􀀆􀀃􀀂􀀔􀀄􀀟􀀉􀀔􀀃􀀆􀀔􀀜􀀃􀀆􀀛􀀃􀀜􀀄􀀗􀀚􀀃􀀆􀀗􀀌􀀄􀀔􀀄􀀗􀀉􀀚􀀆􀀂􀀘􀀃􀀃􀀊􀀂􀀆􀀓􀀖􀀆􀀓􀀛􀀃􀀌􀀔􀀁􀀌􀀅􀀄􀀅􀀕􀀢􀀆􀀪􀀜􀀃􀀆􀀄􀀅􀀛􀀃􀀂􀀔􀀄􀀕􀀉􀀔􀀄􀀓􀀅􀀂􀀆 􀀉􀀌􀀃􀀆􀀙􀀉􀀂􀀃􀀊􀀆􀀓􀀅􀀆􀀉􀀁􀀔􀀓􀀟􀀓􀀙􀀄􀀚􀀃􀀆􀀚􀀉􀀔􀀃􀀌􀀉􀀚􀀆􀀂􀀘􀀉􀀗􀀃􀀆􀀟􀀄􀀊􀀂􀀔􀀆􀀔􀀜􀀃􀀆􀀗􀀃􀀅􀀔􀀃􀀌􀀚􀀄􀀅􀀃􀀂􀀆􀀓􀀖􀀆􀀔􀀜􀀃􀀆􀀙􀀉􀀂􀀃􀀆

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref