Preferred Language
Articles
/
jcois-2010
AYĀT AL-HUJJAH FĪ SŪRAT AL-ANĀM RIWĀIAH WA DERĀIAH ( a model in three verses from Surat Al-An’am 108-110)
...Show More Authors

 

The current research discusses the jurisprudence of the argumentative meaning in the Qur’an, and it is one of the general methods of responses in the Qur’an, as well as the argumentative approach to the recitations of the readers and directing their meanings. I have chosen a model for three verses from Surat Al-An’am, in which there are seven frequent recitations and seven odd ones, on a topic related to theology and faith; It forms the centerpiece of the argument verses in Surat Al-An'am; It contains the jurisprudence of dealing with infidels and dissenters, turning away and forbidding insulting what they claim besides God in the event of corruption, and God Almighty’s decree and wisdom in the occurrence of unbelief with what he celebrates in the tongues, hearts and eyes of the deniers. We need in every age such kind of methods of the Qur’an, especially this era. The importance of this model emerges in the alternation of the two methods of declaring and indoctrination of the argument, and that is the statement of the divine approach in dealing with violators and responding to them as well. And it is a comma in the verses of argument in the entire surah, and after them he said easily: “The word of your Lord has been fulfilled in truth and justice.” I took the balancing approach to the sayings, the meanings of the recitations and their guidance; and exclude for what may be problems.

The most prominent findings: Proving one of the evidences for the source of the divine Qur’an; Because there is no one in the methods of human argument who decides the argument and teaches it at the same time with such strength and understanding in all respects, this is only in the Qur’an, and the statement of part of the Qur’an’s approach in the method of argument is a report we received. The frequent collection with odd in this abundance is evidence of the circumstances of the descent. I recommended writing a scientific thesis to trace Surat Al-An’am as a whole in this type of method of the Qur’an as a report, rooting and criticism of what contradicted from the methods of human beings in argument; As well as writing in rooting the science of argument and the controversy of the Qur’an from the Qur’an itself and tracing its applications.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu May 01 2003
Journal Name
Renewable Energy
FT-IR and XPS analysis of a-Si1-xGex:H thin films
...Show More Authors

View Publication
Scopus (14)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Wed Aug 01 2012
Journal Name
I-manger's Journal On Information Technology
A MODULE FOR ENHANCING RECOGNITION SYSTEM FOR QR CODE SCANNED IMAGE
...Show More Authors

A QR code is a type of barcode that can hold more information than the familiar kind scanned at checkouts around the world. The “QR” stands for “Quick Response”, a reference to the speed at which the large amounts of information they contain can be decoded by scanners. They are being widely used for advertising campaigns, linking to company websites, contest sign-up pages and online menus. In this paper, we propose an efficient module to extract QR code from background and solve problem of rotation in case of inaccurate image taken from mobile camera.

Publication Date
Fri Jan 02 2015
Journal Name
International Journal Of Engineering Research And General Science
IT Auditing to Assure a Secure Cloud Computing for Enterprise Applications
...Show More Authors

Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 03 2022
Journal Name
International Education And Culture Studies
A Future Vision of Mathematics Teacher Preparation Program at the Universities
...Show More Authors

Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
AlexNet-Based Feature Extraction for Cassava Classification: A Machine Learning Approach
...Show More Authors

Cassava, a significant crop in Africa, Asia, and South America, is a staple food for millions. However, classifying cassava species using conventional color, texture, and shape features is inefficient, as cassava leaves exhibit similarities across different types, including toxic and non-toxic varieties. This research aims to overcome the limitations of traditional classification methods by employing deep learning techniques with pre-trained AlexNet as the feature extractor to accurately classify four types of cassava: Gajah, Manggu, Kapok, and Beracun. The dataset was collected from local farms in Lamongan Indonesia. To collect images with agricultural research experts, the dataset consists of 1,400 images, and each type of cassava has

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fusion: Practice And Applications
A Hybrid Meta-Heuristic Approach for Test Case Prioritization and Optimization
...Show More Authors

The application of the test case prioritization method is a key part of system testing intended to think it through and sort out the issues early in the development stage. Traditional prioritization techniques frequently fail to take into account the complexities of big-scale test suites, growing systems and time constraints, therefore cannot fully fix this problem. The proposed study here will deal with a meta-heuristic hybrid method that focuses on addressing the challenges of the modern time. The strategy utilizes genetic algorithms alongside a black hole as a means to create a smooth tradeoff between exploring numerous possibilities and exploiting the best one. The proposed hybrid algorithm of genetic black hole (HGBH) uses the

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Feb 18 2024
Journal Name
Migration Letters
Knee Injuries And Rehabilitation: A Comprehensive Review Of The Psychological Landscape
...Show More Authors

MT Suhail, SA Hussein, MN Abdulhussein, WQ Abdaullateef, M khairallah Aid…, Migration Letters, 2024

View Publication
Publication Date
Tue Mar 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
The suggested threshold to reduce data noise for a factorial experiment
...Show More Authors

In this research, a factorial experiment (4*4) was studied, applied in a completely random block design, with a size of observations, where the design of experiments is used to study the effect of transactions on experimental units and thus obtain data representing experiment observations that The difference in the application of these transactions under different environmental and experimental conditions It causes noise that affects the observation value and thus an increase in the mean square error of the experiment, and to reduce this noise, multiple wavelet reduction was used as a filter for the observations by suggesting an improved threshold that takes into account the different transformation levels based on the logarithm of the b

... Show More
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Engineering
Designing a Secure Software-Defined Radio Transceiver using the Logistic Map
...Show More Authors

The need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security.  This study aims to design an  SDR  transceiver was built using one type of modulation, which is 16 QAM, and adding a  security subsystem using one type of chaos map, which is a  logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and  EXCLUSIVE  OR with the originally transmitted data to protect data through the transmission. At th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
Charge density distributions for odd-A of 2s-1d shell nuclei
...Show More Authors

An analytical expression for the charge density distributions is derived based on the use of occupation numbers of the states and the single particle wave functions of the harmonic oscillator potential with size parameters chosen to reproduce the observed root mean square charge radii for all considered nuclei. The derived expression, which is applicable throughout the whole region of shell nuclei, has been employed in the calculations concerning the charge density distributions for odd- of shell nuclei, such as and nuclei. It is found that introducing an additional parameters, namely and which reflect the difference of the occupation numbers of the states from the prediction of the simple shell model leads to obtain a remarkabl

... Show More
View Publication Preview PDF
Crossref (1)
Crossref