Preferred Language
Articles
/
jcois-2140
The door of speaking souls From the book explaining the features of the origins of religion For Sheikh Abdul Rahman bin Abdullah Al-Khonji study and investigation
...Show More Authors

Praise be to God who created the soul, perfected it, and inspired it with its immorality and piety. He says in His Noble Book: ﭤ Fajr: 27-30 Glory be to You, O God! O Lord, on whom I have chosen for You as a beloved from myself and the soul of the two worlds, may our master Muhammad be sacrificed for him, who enlightened the horizons with his introduction to enlightenment. It soon ends with the end of pleasure, which is the opposite of the pleasure of thought and meaning, as it is permanent and continuous, and from here we see that the Messenger of God, may God’s prayers and peace be upon him, urges us in various places to seek knowledge and fortify the soul and thought in a way that raises one’s status and protects him from the struggle of evil in this world and the Hereafter, where he said, may God’s prayers and peace be upon him : (Whoever travels a path seeking knowledge, Allah will make a path easy for him to Paradise, and the angels lower their wings in approval (narrators of the omnipotent). And we are in the midst of this relentless campaign against the ideas of our late nation, behind which it is intended to obliterate the correct intellectual truth and replace it with atheistic ideas or ideas that lead us to diminish the greatness of Islam, its creed and its law, we find it necessary for us to enlighten and understand well our Islamic heritage and what our previous scholars left of the civilizational and sober intellectual legacy Especially in the field of fighting philosophers, atheists, and those with narrow ideas, through the extensive and detailed study of those important manuscripts that are found in the shelves of international libraries. Ibn Abd al-Rashid al-Khawji, may God have mercy on him, a wide mercy, as he explained in it the book Ma’alim Usul al-Din by Imam Fakhr al-Islam Muhammad ibn Umar al-Razi, upon him be the clouds of mercy and pleasure. And it is called the speaking souls. May God make us among those who speak the truth in this world and the Hereafter. He is the best protector, and the best supporter to him is our fear in the few and the many, and may God's prayers and peace be upon the pearl of the coincidence of existence and the owner of the praised place, our master and our lord Muhammad and his good family and his faithful companions.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 25 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Knowledge, Attitudes and Barriers Towards Breast Cancer Health Education Among Iraqi Community Pharmacists
...Show More Authors

With the increasing prevalence of breast cancer among female internationally, occupies about 25% of all cases of cancer, with a measured 1.57 million up to date cases in 2012. Breast cancer has turn a most warning to health of female in Iraq, where it is the major cause of death among women after cardiovascular diseases, with a mortality rate of 23% related cancer. Recently there is a crucial requirement to include community pharmacists in health elevation activities to support awareness and early diagnosis of cancer, specially breast cancer. The aim of this study is to assess knowledge, attitude and perceived barriers amongst Iraqi community pharmacists towards health promotion of breast cancer. This study is cross sectional research. A

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Mon Feb 07 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Mathematical connection skills and their relationship with productive thinking among secondary school students
...Show More Authors

View Publication
Crossref (8)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Sep 01 2022
Journal Name
Journal Of Medicine And Life
Arrhythmia related to hypertensive left ventricular hypertrophy in Iraqi patients: frequency and outcome
...Show More Authors

Left ventricular hypertrophy (LVH) caused by high blood pressure is linked to increased mortality and arrhythmia risk. This study aimed to evaluate arrhythmia in hypertensive patients due to left ventricular hypertrophy (LVH). A cross-sectional study was performed, assessing participants' blood pressure, echocardiography and electrocardiography, and Holter monitoring in certain cases. There were 300 hypertensive patients >18 years attending the cardiology unit of Baghdad medical city. The study was conducted between January–June 2022. The electrocardiograms at rest for 300 adults with hypertension were investigated. 130 (43.5%) were females, and 170 (56.5%) were males. The mean age of participants was 58 years. Forty-nine (16.3

... Show More
View Publication
Scopus (13)
Crossref (11)
Scopus Crossref
Publication Date
Mon Jun 27 2022
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn: 2789-3219 )
Self-Reported Sleep Disorder, Anxiety and Depression in Iraqi Patients Post-Myocardial Infraction
...Show More Authors

Background: Myocardial infarction (MI) is distinguished by the necrosis of myocardial cells as a result of substantial and prolonged ischemia. Anxiety, problems sleeping, and feelings of depression are some of the most common psychosocial consequences of having a myocardial infarction. Aim: The purpose of this study is to evaluate the effects of post-myocardial infarction on patients' levels of anxiety, depression, and quality of sleep. Method: The collection of data from 94 individuals with MI was carried out according to a descriptive cross-sectional design. Sleep quality, depression, and anxiety were evaluated using standard questionnaires. Results: 69.1% of the participants reported having trouble getting quality sleep. The perc

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Mon Aug 21 2023
Journal Name
Communications In Mathematical Biology And Neuroscience
Delay in eco-epidemiological prey-predator model with predation fear and hunting cooperation
...Show More Authors

It is recognized that organisms live and interact in groups, exposing them to various elements like disease, fear, hunting cooperation, and others. As a result, in this paper, we adopted the construction of a mathematical model that describes the interaction of the prey with the predator when there is an infectious disease, as well as the predator community's characteristic of cooperation in hunting, which generates great fear in the prey community. Furthermore, the presence of an incubation period for the disease provides a delay in disease transmission from diseased predators to healthy predators. This research aims to examine the proposed mathematical model's solution behavior to better understand these elements' impact on an eco-epidemi

... Show More
View Publication
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jun 23 2015
Journal Name
Nature Communications
A metabolic stress-inducible miR-34a-HNF4α pathway regulates lipid and lipoprotein metabolism
...Show More Authors

View Publication
Scopus (220)
Crossref (218)
Scopus Clarivate Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (31)
Crossref (24)
Scopus Clarivate Crossref