Praise be to God who created the soul, perfected it, and inspired it with its immorality and piety. He says in His Noble Book: ﭤ Fajr: 27-30 Glory be to You, O God! O Lord, on whom I have chosen for You as a beloved from myself and the soul of the two worlds, may our master Muhammad be sacrificed for him, who enlightened the horizons with his introduction to enlightenment. It soon ends with the end of pleasure, which is the opposite of the pleasure of thought and meaning, as it is permanent and continuous, and from here we see that the Messenger of God, may God’s prayers and peace be upon him, urges us in various places to seek knowledge and fortify the soul and thought in a way that raises one’s status and protects him from the struggle of evil in this world and the Hereafter, where he said, may God’s prayers and peace be upon him : (Whoever travels a path seeking knowledge, Allah will make a path easy for him to Paradise, and the angels lower their wings in approval (narrators of the omnipotent). And we are in the midst of this relentless campaign against the ideas of our late nation, behind which it is intended to obliterate the correct intellectual truth and replace it with atheistic ideas or ideas that lead us to diminish the greatness of Islam, its creed and its law, we find it necessary for us to enlighten and understand well our Islamic heritage and what our previous scholars left of the civilizational and sober intellectual legacy Especially in the field of fighting philosophers, atheists, and those with narrow ideas, through the extensive and detailed study of those important manuscripts that are found in the shelves of international libraries. Ibn Abd al-Rashid al-Khawji, may God have mercy on him, a wide mercy, as he explained in it the book Ma’alim Usul al-Din by Imam Fakhr al-Islam Muhammad ibn Umar al-Razi, upon him be the clouds of mercy and pleasure. And it is called the speaking souls. May God make us among those who speak the truth in this world and the Hereafter. He is the best protector, and the best supporter to him is our fear in the few and the many, and may God's prayers and peace be upon the pearl of the coincidence of existence and the owner of the praised place, our master and our lord Muhammad and his good family and his faithful companions.
The importance of this study of the growing importance of perception of touch and its association with the job performance of industrial product since the perception stereotactic means he means practiced by the individual through job performance and has assets of knowledge in the mind of the user and require him to mind the capabilities and knowledge cognitive following their individual focus Zhennea.oanfalh following their enthusiasm when using Sense of touch. The study in the first chapter of the research problem to reveal the role played by the process of cognition and its relationship with the touch function of the industrial product and the associated defect in performance and harder to use. The study also pointed to the research ob
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThis research aims to know the essence of the correlative relationship between tactical thinking and solving mathematical problems. The researchers followed the descriptive research method to analyze relations, as all students from the mathematics department in the morning study were part of the research group. The research sample of (100) male and female students has been chosen based on the arbitrators' views. The tools for studying the sample of research composed of (12) items of the multiple-choice test in its final form to measure tactical thinking and require establish-ing a test of (6) test-type paragraphs to solve mathematical problems. The findings showed that sample students' tactical thinking and their capacity to overcome mathem
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show More