Preferred Language
Articles
/
jcois-246
Rules for dealing with the offender in Islamic thought
...Show More Authors

Research summary

Today, the Islamic nation is going through a phase that is one of the most dangerous that it has never experienced before. This phase was characterized by the following:

The nation is divided into states and its weakness in most of its doctrinal, political, social, economic and moral aspects.
Enemies targeting the nation's faith and capabilities, and the emergence of loyalty to the enemies of the nation from some groups of society, spreading misconceptions in the Muslim community.
Spreading the spirit of rebellion in all segments of society and striving to stir up the people against the rulers and put pressure on the rulers.

All these manifestations and others require the nation's wise men to study, review and find appropriate solutions. Today, the enemies are waiting for us and trying hard to divide the word. It is our duty to unify the word and close ranks to face the multiple challenges.

All of this prompted me to write this research and set the rules adopted by the thinkers of Islam to reconsider our dealings with each other so as not to allow our enemies to exploit the simplest differences that lead to the rift of the fraternal ranks.

Therefore, the approach that can govern issues of disagreement must be clear through established controls from the Holy Qur’an, the purified Sunnah, and the sayings of the nation’s scholars to preserve the unity of the nation.

The integrity of the curriculum solves many disputes, brings hearts closer, strengthens the nation, and blocks the way for the enemies of the nation. In this research, a number of intellectual controls were collected to deal with the violators, adopted by preachers and thinkers, depending on the Holy Qur’an and the noble Prophet’s Sunnah, with reference to the sayings of scholars in the indication of each of them on what is intended or From what they extracted from the spirit of Sharia glue.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
International Journal Of Nonlinear Analysis And Application
Suggested methods for prediction using semiparametric regression function
...Show More Authors

Ferritin is a key organizer of protected deregulation, particularly below risky hyperferritinemia, by straight immune-suppressive and pro-inflammatory things. , We conclude that there is a significant association between levels of ferritin and the harshness of COVID-19. In this paper we introduce a semi- parametric method for prediction by making a combination between NN and regression models. So, two methodologies are adopted, Neural Network (NN) and regression model in design the model; the data were collected from مستشفى دار التمريض الخاص for period 11/7/2021- 23/7/2021, we have 100 person, With COVID 12 Female & 38 Male out of 50, while 26 Female & 24 Male non COVID out of 50. The input variables of the NN m

... Show More
Preview PDF
Scopus
Publication Date
Wed Jan 01 2020
Journal Name
Arab Journal Of Basic And Applied Sciences
Reliable iterative methods for 1D Swift–Hohenberg equation
...Show More Authors

View Publication
Crossref (5)
Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Theoretical Study of Thermal Cracking For Acenaphthylene Molecule
...Show More Authors

Density Functional Theory (DFT) calculations were carried out to study the thermal cracking for acenaphthylene molecule to estimate the bond energies for breaking C8b-C5a , C5a-C5 , C5-C4 , and C5-H5 bonds as well as the activation energies. It was found that for C8b-C5a , C5-C4 , and C5-H5 reactions it is often possible to identify one pathway for bond breakage through the singlet or triplet states. The atomic charges , dipole moment and nuclear – nuclear repulsion energy supported the breakage bond .Also, it was found that the activation energy value for C5-H5 bond breakage is lower than that required for C8b-C5a , C5a-C5 , C5-C4 bonds which refer to C5-H5 bond in acenaphthylene molecule are weaker than C8b-C5a , C5a-C5 , C5-C

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 29 2020
Journal Name
International Journal Of Simulation: Systems, Science & Technology
A New Compact Microstrip Antenna for WSN Applications
...Show More Authors

View Publication
Crossref
Publication Date
Sun May 01 2011
Journal Name
2011 Ieee 3rd International Conference On Communication Software And Networks
Towards computer vision feedback for enhanced CNC machining
...Show More Authors

View Publication
Scopus (9)
Crossref (6)
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Aip Conference Proceedings
Study optoelectronic properties for polymer composite thick film
...Show More Authors

View Publication
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Dec 31 2014
Journal Name
Iraqi Journal For Computers And Informatics
Gate Control System for New Iraqi License Plate
...Show More Authors

This paper presents an approach to license plate localization and recognition. A proposed method is designed to control the opening of door gate based on the recognition of the license plates number in Iraq. In general the system consists of four stages; Image capturing, License plate cropping, character segmentation and character recognition. In the first stage, the vehicle photo is taken from standard camera placed on the door gate with a specific distance from the front of vehicle to be processed by our system. Then, the detection method searches for the matching of the license plate in the image with a standard plate. The segmentation stage is performed by is using edge detection. Then character recognition, done by comparing with templ

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Aug 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Estimation Optimal Threshold Value for Image Edge Detection
...Show More Authors

      A new approach presented in this study to determine the optimal edge detection threshold value. This approach is base on extracting small homogenous blocks from unequal mean targets. Then, from these blocks we generate small image with known edges (edges represent the lines between the contacted blocks). So, these simulated edges can be assumed as true edges .The true simulated edges, compared with the detected edges in the small generated image is done by using different thresholding values. The comparison based on computing mean square errors between the simulated edge image and the produced edge image from edge detector methods. The mean square error computed for the total edge image (Er), for edge regio

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2011
Journal Name
2011 Developments In E-systems Engineering
Enhanced Computation Time for Fast Block Matching Algorithm
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Lecture Notes On Data Engineering And Communications Technologies
Utilizing Deep Learning Technique for Arabic Image Captioning
...Show More Authors

View Publication
Scopus Crossref