The text has many connotations in the Arabic language, such as vowel points, designation, completion, etc., and the original meaning of the text is to show. The Western text has its owen independent semantic unit .The biblical texts are a mixture of what was reported by the Prophet Moses (peace be upon him) and what the authors described in terms of texts over many centuries.The meaning of the text is guidance and payment, and it is a natural connotation. The religious text for Muslims is divided into peremptory texts that are national proof. The evidence for the meaning of the text is proven by language, and it is not required that the researcher be a jurist. The approach is a factual questionnaire by the researcher according to a specific scientific approach. As for the methodology, it searches for the scientific means that pervade all cognitive processes. One of the mechanisms for understanding the sacred text of Westerners is hermeneutics, which played a fundamental role in understanding religious texts by creating principles and laws for interpretation so that it is logical.
Abstract
This study aims to identify the repercussions of the Corona pandemic (Covid 19) and its impact on the educational and psychological functions of the Omani family from the point of view of a number of fathers and mothers. Drive for a group of fathers and mothers, some of whom work in the government sector and others are mothers enrolled in graduate studies programs at the university, their ages range between (30-50 years) totally (28) mothers and fathers: 22 mothers and 6 fathers. The results showed that the repercussions of the transformation of e-learning, home quarantine, social distancing, and the challenges associated with them were among the most frequent responses that posed a real challenge to the
... Show MoreThe love of the world and its lusts are the head of sins and the corruptors of religion, and the one who loves and loves them who prefers them over the hereafter is one of the most pitiful of creation, and the least intelligent of them, as he prefers imagination over reality, sleep over wakefulness, fleeting shadow over eternal bliss and the mortal abode over the eternal abode, and he sold the life of eternity for the most luxurious life. In life, it is dreams and sleep or as a fleeting shadow, and as it was said: The intelligent person is not deceived.
The reason for choosing this topic is due to two things:
The first: When I contemplated the reasons for the differences and conflicts that afflicted our wounded and occupied country
Building a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro
... Show MoreExchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreA legal discourse in the Qur’an and Sunnah is almost devoid of the use of one of the general formulas, and due to its frequent rotation in the tongue of the legislator, the formulas may overlap their members in apparently contradictory provisions, which makes the individual from the general members appear to the beholder to be covered by two contradictory provisions, and this research came to present what might happen to him The legal text interpreter of weighting between the two opposing texts is the strength of the generality that is established by the generality formula, so the two strongest formulas in the inclusion of its members outweigh the weaker of them and precede them, and the research decided that the formulas vary
... Show MoreThe new events in every era are endless, and it is not required of the legal texts to pursue each event by itself and attach to it its ruling.
At the same time, every event or action must have a Shari’a ruling according to the wise Lawgiver, and our scholars have noted this in every event presented to them. ...etc.
It is well known that reaching the legal ruling on a matter, by examining the detailed evidence, is subject to following the path of the rules and regulations specific to the overall evidence, which we organize on the basis of the principles of jurisprudence.
Therefore, any disagreement about the manner or content of these rules will have an impact on the difference of jurists in partial issues, when examining the d
Summary of the research in English:
the research seeks to define the provisions of voluntary charity and some of its contemporary applications, so the research is after the definition of charity and voluntary charity, define the provisions of the Most important thing charity, where the one who is given charity, in the introduction, he talked about the importance of charity in social solidarity,As for the first topic ,it deait with a statement and definition of charity in the Quran,sunnah and comparative juris prudence,whil the second topic was conducted with clarifying the provisions of the ratified, the ratified,while the third topic was concerned with clarifying the application of voluntary charity contemporary investing the Mo
... Show MoreThe concept of the active contour model has been extensively utilized in the segmentation and analysis of images. This technology has been effectively employed in identifying the contours in object recognition, computer graphics and vision, biomedical processing of images that is normal images or medical images such as Magnetic Resonance Images (MRI), X-rays, plus Ultrasound imaging. Three colleagues, Kass, Witkin and Terzopoulos developed this energy, lessening “Active Contour Models” (equally identified as Snake) back in 1987. Being curved in nature, snakes are characterized in an image field and are capable of being set in motion by external and internal forces within image data and the curve itself in that order. The present s
... Show More