Preferred Language
Articles
/
jcois-2298
Grammarians’ opinions on stopping and tilting in Al-Kanz by Al-Wasiti
...Show More Authors

Praise be to God, and may blessings and peace be upon our master and Prophet Muhammad and those who follow him, and may God be pleased with him

Taha is my guardian and whoever follows their path until the Day of Judgment. And after... The book (The Treasure in the Ten Recitations), written by Abu Muhammad Abdullah bin Abd al-Wasiti, who died in the year 710 AH, is considered one of the important books in recitations: because it included the universal custom that it contained in the books Al-Taysir by Al-Dani and Al-Irshad by Al-Falanisi, as the first of them was specialized.

Satisfy the second with the ten readings

May God bless my time, through His grace and generosity, to achieve this treasure and to publish it in the year 2004 AD at the Al-Masry Press in Palmyra, in parts. Each part is approximately four hundred pages. The first part included my study of this book, in which I presented the author’s life and a description of the book’s manuscript, along with a study of the linguistic and grammatical issues included in some of the readings contained in it. . Upon reviewing this study, I saw that I did not touch upon the phenomena of pausing and tilting in the proverbs, and they are worthy of attention and study in their own research. So, this research was in which I introduced the definition of them in the mediation of the author of the blocks, with a balance between him and the linguists and grammarians. This is the mainstay of this research. As for the representation of these two phenomena, I did not expand or do more of it, but rather stopped at some of the evidence, which gives a picture of what the people of the language and grammarians said about it. It is no secret to every student of Minya that pausing and tilting in recitations are important and closely related to grammar and Arabic sounds.

In my work, I did not intend to investigate all the cases of pauses and slanting in the book Al-Kinza, for fear of prolonging it and deviating from the prescribed volume of academic research, and avoiding repetition in the introduction of consonant letters. Likewise, I did not divide the research into chapters and sections, as is the custom among scholars and researchers, because that is not possible. Rather, I divided it into subtitled paragraphs, under which some

Its molecules and evidence.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 31 2023
Journal Name
International Journal On Technical And Physical Problems Of Engineering
A Multiple System Biometric System Based on ECG Data
...Show More Authors

A Multiple System Biometric System Based on ECG Data

Scopus (1)
Scopus
Publication Date
Mon Jul 01 2019
Journal Name
Arpn Journal Of Engineering And Applied Sciences
PSEUDO RANDOM NUMBER GENERATOR BASED ON NEURO-FUZZY MODELS
...Show More Authors

Producing pseudo-random numbers (PRN) with high performance is one of the important issues that attract many researchers today. This paper suggests pseudo-random number generator models that integrate Hopfield Neural Network (HNN) with fuzzy logic system to improve the randomness of the Hopfield Pseudo-random generator. The fuzzy logic system has been introduced to control the update of HNN parameters. The proposed model is compared with three state-ofthe-art baselines the results analysis using National Institute of Standards and Technology (NIST) statistical test and ENT test shows that the projected model is statistically significant in comparison to the baselines and this demonstrates the competency of neuro-fuzzy based model to produce

... Show More
View Publication
Publication Date
Fri Jan 04 2019
Journal Name
Journal Of Planner And Development
Impact of D.B.M. Best practices on Community Rehabilitation Projects
...Show More Authors

View Publication Preview PDF
Publication Date
Fri Apr 30 2010
Journal Name
Journal Of Applied Computer Science & Mathematics
Image Hiding Using Magnitude Modulation on the DCT Coefficients
...Show More Authors

In this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-

... Show More
View Publication
Publication Date
Tue Aug 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Assessment of X-Ray Effects on HF Radio Communications
...Show More Authors
Abstract<p>This study aims to determine the effect of x-ray radiation resulting from solar flares in high-frequency radio wave communications through the ionosphere and to study the radio blackout events that occur over Iraq, located within (38,28) latitude, and (38,49) longitude. Using X-ray data during strong X flares and radio wave absorption data across the D ionosphere for 10 years from 2012 to 2021. The study concluded that there were 43 events of x-flare, most of which were during years of high solar activity. All of these flares produced X-rays that caused a radio blackout, R3 and only 13 events affected Iraq.</p>
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
Gamma irradiation effect on characterization of MoO3 nanostructures films
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
International Journal Of Recent Trends In Engineering & Research
Password Authentication Based On Modify Bidirectional Associative Memory (MBAM)
...Show More Authors

Password authentication is popular approach to the system security and it is also very important system security procedure to gain access to resources of the user. This paper description password authentication method by using Modify Bidirectional Associative Memory (MBAM) algorithm for both graphical and textual password for more efficient in speed and accuracy. Among 100 test the accuracy result is 100% for graphical and textual password to authenticate a user.

Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Effects of ethanol on the hippocampus of rat Brain
...Show More Authors

ten albino male rates were orally treated daily 20% and 30% ethanol for 30 days treatment with 30%ethanol caused of hippocampuse of darckness google hospital patients

View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
The influence of incorporating recycled brick on concrete properties
...Show More Authors
Abstract<p>One of the major problems in modern construction is the accumulation of construction and demolition waste; this study thus examines the consumption of waste brick in concrete based on the use of blended nano brick powder as replacement for cement and as a fine aggregate. Seven concrete mixes were developed according to ACI 211.1 using recycled waste brick. Nano powder brick at 0, 5, and 10% was used as a replacement by cement weight, with other mixes featuring 10, 20, and 30% partial replacement by volume of river sand with brick. The experimental results for replacement of cement with nano brick powder showed an enhancement in mechanical properties (compressive, flexural, and tensile strength) at 7,</p> ... Show More
View Publication
Crossref (5)
Crossref