There are great figures in our nation, who are famous for their encyclopedia in their sciences, and their fame spreads across the horizons for what they presented to their religion and nation.
So they became torches of guidance, advocates of goodness, and treasuries of knowledge until God inherits the earth and those on it.
Among these imams is Imam al-Qurtubi, who died in the year (671 AH), after whom he left a great legacy of valuable books, including this one, which is the subject of my research, his valuable interpretation (Al-Jami’ Li Ahkam Al-Qur’an). Taking from him and his approach in interpreting the verses of judgment, following the method of extrapolation, investigation and deduction to know his style, which he used in his authorship, and to stand on the sources that he relied on in his book.
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreTo maintain a sustained competitive position in the contemporary environment of knowledge economy, organizations as an open social systems must have an ability to learn and know how to adapt to rapid changes in a proper fashion so that organizational objectives will be achieved efficiently and effectively. A multilevel approach is adopted proposing that organizational learning suffers from the lack of interest about the strategic competitive performance of the organization. This remains implicit almost in all models of organizational learning and there is little focus on how learning organizations achieve sustainable competitive advantage . A dynamic model that captures t
... Show MoreThe objectives of the study were to identify the incidence rate and characteristics of adverse drug events (ADEs) in nursing homes (NHs) using the ADE trigger tool and to evaluate the relationships between resident and facility work system factors and incidence of ADEs using the System Engineering Initiative for Patient Safety (SEIPS) model. The study used 2 observational quantitative methods, retrospective resident chart extraction, and surveys. The participating staff included Directors of nursing, registered nurses, certified nurse assistants (CNAs). Data were collected from fall 2016 to spring 2017 from 11 NHs in 9 cities in Iowa. Binary logistic regression with generalized estimated equations was used to measure the association
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreEvery so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberph
... Show MoreIn this work the radioactive wastes in the Old Russian
Cemetery Al -Tuwaitha site were classified according to risks for
workers who are involved in the retrieval process. The exposure
assessment results expressed as estimates of radionuclide intakes by
inhalation and ingestion, exposure rates and duration for external
exposure pathways, and committed effective dose equivalents to
individuals from all relevant radionuclides and pathways. Results
showed the presence of natural radionuclides Ra-226, Th-234 and K-
40, as well as the produced radionuclide Cs-137 and Eu-152 in the
cemetery wells. The absorbed doses from the waste were classified to
two categories; exempt waste and low level waste according to
SUMMARY. The objectives of the present study were to assess the possible predictors of COVID-19 severity and duration of hospitalization and to identify the possible correlation between patient parameters, disease severity and duration of hospitalization. The study included retrospective medical record extraction of previous coron avirus COVID-19 patients in Basra hospitals, Iraq from March 1st and May 31st, 2020. The information of the participants was investigated anonymously. All the patients’ characteristics, treatments, vital signs and laboratory tests (hematological, renal and liver function tests) were collected. The analysis was conducted using the SPSS (version 22, USA). Spearman correlation was used to measure the relations
... Show More