Preferred Language
Articles
/
jcois-2002
Ethics (stop harming, guarding the tongue, spreading peace and spending) in the hadiths of the Prophet, book (Faith) from Sahih Al-Bukhari / model - analytical study: : Ethics of restraining harm in the hadiths of the Prophet "Analytical study"
...Show More Authors

(Social values) are of great importance in the lives of nations and peoples as they are the frame of reference that governs the relations of members of society to each other and regulates their life affairs.

And the Prophet of Islam (may God’s prayers and peace be upon him) has told about a group of (social values) such as: spreading peace, feeding food, being fair in dealing with others, and clarifying what a Muslim should have towards his Muslim brother from the safety of the chest and refraining from harming him with the tongue and hand, and so on. Ethics and behaviors that are directly and closely related to (social values).

The best book that abounds with these (social values) and lofty behaviors is the book (The Sahih Mosque) by Imam Al-Bukhari who died in the year (256 AH) from the book (Faith), where the two researchers studied, analyzed and extracted the benefits, patience and sermons learned from these honorable prophetic hadiths

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jan 15 2020
Journal Name
Emerging Trends In Mechatronics
Interactional Modeling and Optimized PD Impedance Control Design for Robust Safe Fingertip Grasping
...Show More Authors

View Publication
Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Build and Implemented Learning Package for Prolog Programming Language Using Visual Basic.Net 2010
...Show More Authors

E-Learning packages are content and instructional methods delivered on a computer
(whether on the Internet, or an intranet), and designed to build knowledge and skills related to
individual or organizational goals. This definition addresses: The what: Training delivered
in digital form. The how: By content and instructional methods, to help learn the content.
The why: Improve organizational performance by building job-relevant knowledge and
skills in workers.
This paper has been designed and implemented a learning package for Prolog Programming
Language. This is done by using Visual Basic.Net programming language 2010 in
conjunction with the Microsoft Office Access 2007. Also this package introduces several
fac

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
Arab World English Journal
Impoliteness Formulas, Triggers, and Purposes to Refusal as Employed by Iraqi English Learners
...Show More Authors

The present study aims at scrutinizing the impoliteness types, causes, and purposes utilized by Iraqi English language learners when refusing marriage proposals. Thus, it attempts to answer the questions: (1) what are the impoliteness formulas used by the Iraqi learners of English in refusing marriage proposals?, and (2) What are their impoliteness triggers/causes and the purposes? The study is significant in bridging the gap that few linguistic types of research concentrate on studying intentionality and emotions allied with impoliteness. Data were collected from 35 Iraqi learners of English responding to 6 situations of marriage. The data were analyzed using Culpeper’s (2011) formulas of impoliteness and Bousfield’s (2007) imp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
End-to-End Speaker Profiling Using 1D CNN Architectures and Filter Bank Initialization
...Show More Authors

The automatic estimation of speaker characteristics, such as height, age, and gender, has various applications in forensics, surveillance, customer service, and many human-robot interaction applications. These applications are often required to produce a response promptly. This work proposes a novel approach to speaker profiling by combining filter bank initializations, such as continuous wavelets and gammatone filter banks, with one-dimensional (1D) convolutional neural networks (CNN) and residual blocks. The proposed end-to-end model goes from the raw waveform to an estimated height, age, and gender of the speaker by learning speaker representation directly from the audio signal without relying on handcrafted and pre-computed acou

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
2023 Ieee 36th International Symposium On Computer-based Medical Systems (cbms)
Toward a Minimal sEMG Setup for Knee and Ankle Kinematic Estimation during Gait
...Show More Authors

View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Dec 25 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Knowledge, Attitudes and Barriers Towards Breast Cancer Health Education Among Iraqi Community Pharmacists
...Show More Authors

With the increasing prevalence of breast cancer among female internationally, occupies about 25% of all cases of cancer, with a measured 1.57 million up to date cases in 2012. Breast cancer has turn a most warning to health of female in Iraq, where it is the major cause of death among women after cardiovascular diseases, with a mortality rate of 23% related cancer. Recently there is a crucial requirement to include community pharmacists in health elevation activities to support awareness and early diagnosis of cancer, specially breast cancer. The aim of this study is to assess knowledge, attitude and perceived barriers amongst Iraqi community pharmacists towards health promotion of breast cancer. This study is cross sectional research. A

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Compared Some Estimators Ordinary Ridge Regression And Bayesian Ridge Regression With Practical Application
...Show More Authors

Maulticollinearity is a problem that always occurs when two or more predictor variables are correlated with each other. consist of the breach of one basic assumptions of the ordinary least squares method with biased estimates results, There are several methods which are proposed to handle this problem including the  method To address a problem  and  method To address a problem , In this research a comparisons are employed between the biased   method and unbiased   method with Bayesian   using Gamma distribution  method  addition to Ordinary Least Square metho

... Show More
View Publication Preview PDF
Crossref