Preferred Language
Articles
/
jcois-2172
The Role Of Atheism In The Demolition Of Societal Security
...Show More Authors

The enemies of religion are still following the approach of undermining the Islamic faith in various ways through the diversity of methods of smear campaigns by raising suspicions to obliterate the Islamic identity and threaten security and stability of social life under the Islamic religion in Islamic societies, as we find that they have employed the doctrine of atheistic thought in order to distance people from the path of truth, distort the features of religion, destabilize psychological security and family stability, and thus destroy societal security by questioning the tolerant faith at times, and by raising suspicions at other times.

Hence, this research came to review the legal duty that requires Islamic scholars to protect the Islamic community from this dangerous epidemic and to inject Islamic youth with the serum of the true faith to confront the disease of the age, which is atheism, by refuting atheistic suspicions and responding to them, and warning Islamic societies of their danger and alerting to the devious ways that the enemies of Islam followed it in spreading poisons and atheistic ideas, and finding out the mechanism for immunizing the individual and society from being affected by atheistic principles through the role of the media in spreading the necessary awareness to eliminate this phenomenon that is spreading in future generations, and activating the role of the teacher and educator in schools and universities to educate promising youth against this The fierce attack that wants to destroy the Islamic faith.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Apr 08 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Bifurcation analysis of the role of good and bad bacteria in the decomposing toxins in the intestine with the impact of antibiotic and probiotics supplement
...Show More Authors

This study presents a mathematical model describing the interaction of gut bacteria in the participation of probiotics and antibiotics, assuming that some good bacteria become harmful through mutations due to antibiotic exposure. The qualitative analysis exposes twelve equilibrium points, such as a good-bacteria equilibrium, a bad-bacteria equilibrium, and a coexisting endemic equilibrium in which both bacteria exist while being exposed to antibiotics. The theory of the Sotomayor theorem is applied to study the local bifurcation around all possible equilibrium points. It’s noticed that the transcritical and saddle-node bifurcation could occur near some of the system’s equilibrium points, while pitchfork bifurcation cannot be accrued at

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Indian Journal Of Public Health Research & Development
The Role of Salivary Cortisol and <i>Mutans Streptococci</i> in the Development of Early Childhood Caries
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Fri Feb 19 2016
Journal Name
International Journal Of Pure And Applied Mathematics
THE ROLE OF DYNAMIC PROGRAMMING IN THE DISTRIBUTION OF INVESTMENT ALLOCATIONS BETWEEN PRODUCTION LINES WITH AN APPLICATION
...Show More Authors

At present, the ability to promote national economy by adjusting to political, economic, and technological variables is one of the largest challenges faced by organization productivity. This challenge prompts changes in structure and line productivity, given that cash has not been invested. Thus, the management searches for investment opportunities that have achieved the optimum value of the annual increases in total output value of the production line workers in the laboratory. Therefore, the application of dynamic programming model is adopted in this study by addressing the division of investment expenditures to cope with market-dumping policy and to strive non-stop production at work.

View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
Place dependence as the physical environment role function in the place attachment
...Show More Authors
Abstract<p>This research sheds light on the physical environment role in creating the place attachment, by discussing one of the important factors in the attachment creation, it is the concept place dependence, consisting of two important dimensions: the place quality and the place expectation; they contain a number of the supporter physical environment sub-indicators for place attachment. Eight physical indicators were reached; they were found to have a close relationship to the place attachment, including: the open and green spaces existence, land use diversity, diversity of housing types, dwelling / population density, accessibility, transport network development degree, transport multiple mo</p> ... Show More
View Publication
Scopus (12)
Crossref (4)
Scopus Crossref
Publication Date
Mon Apr 15 2019
Journal Name
Journal Of Global Pharma Technology
The dual role of Gentamicin in gene expression of fibronectin binding proteins in Staphylococcus aureus
...Show More Authors

Objectives: The current work aimed to reveal the impact of gentamicin on the fibronectin binding proteins (fnbp) gene expression and its relation to biofilm and agr type in Staphylococcus aureus. Materials and Methods: A total of 25 S. aureus isolates were enrolled in this study previously isolated from different specimens. Identification confirmation and methicillin resistance were achieved by amplification of 16SrRNA and mecA. Multiplex polymerase chain reaction (PCR) based assay was employed to evaluate the agr typing. The gene expression of fnbA and fnbB genes was tested by real-time PCR technique. Minimum inhibitory concentration was estimated by micro broth dilution methodology. Microtiter plate method was performed to determine the a

... Show More
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
International Auditing Standards and their role in rationalizing the auditor's personal judgment in Iraq"
...Show More Authors

The impact of the auditor's personal judgment starts from the beginning of the audit process to the formation of the final opinion and the issuance of the report, and because of the possibility of bias in the auditor's judgment for various reasons that may relate to the auditor himself or the circumstances surrounding it, which requires assessing the current reality of the auditor's personal judgments In the local environment and determining their determinations. To clarify the concept and determinants of the auditor's personal judgments when implementing the audit work, prepare the report and determine the role of the international auditing standards in rationalizing the auditor's personal judgment when conducti

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The economic effects of money laundering and the role of banking service in combat it: a prospective study of a sample
...Show More Authors

Money laundering is consider a crime in legal perspective and aphenomenon of negative effects in economic and Social perspective for thevarious countries of the world by the diversity of their economies to make thebadly damaged in the banking service and its reputation in some cases may leadto bankruptcy of banks, and the fact that banks is one of the most importantcircles that revolve the illicit funds, Due to its branched the banking operations,speed and overlap and increase it's complicated with the progress of bankingoperations and the use of electronic services modern here's challenges atvarious levels between the application of the legislation to combat moneylaundering and between actual fact it must find ways and means of legislat

... Show More
View Publication Preview PDF