Preferred Language
Articles
/
jcois-246
Rules for dealing with the offender in Islamic thought
...Show More Authors

Research summary

Today, the Islamic nation is going through a phase that is one of the most dangerous that it has never experienced before. This phase was characterized by the following:

The nation is divided into states and its weakness in most of its doctrinal, political, social, economic and moral aspects.
Enemies targeting the nation's faith and capabilities, and the emergence of loyalty to the enemies of the nation from some groups of society, spreading misconceptions in the Muslim community.
Spreading the spirit of rebellion in all segments of society and striving to stir up the people against the rulers and put pressure on the rulers.

All these manifestations and others require the nation's wise men to study, review and find appropriate solutions. Today, the enemies are waiting for us and trying hard to divide the word. It is our duty to unify the word and close ranks to face the multiple challenges.

All of this prompted me to write this research and set the rules adopted by the thinkers of Islam to reconsider our dealings with each other so as not to allow our enemies to exploit the simplest differences that lead to the rift of the fraternal ranks.

Therefore, the approach that can govern issues of disagreement must be clear through established controls from the Holy Qur’an, the purified Sunnah, and the sayings of the nation’s scholars to preserve the unity of the nation.

The integrity of the curriculum solves many disputes, brings hearts closer, strengthens the nation, and blocks the way for the enemies of the nation. In this research, a number of intellectual controls were collected to deal with the violators, adopted by preachers and thinkers, depending on the Holy Qur’an and the noble Prophet’s Sunnah, with reference to the sayings of scholars in the indication of each of them on what is intended or From what they extracted from the spirit of Sharia glue.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 15 2017
Journal Name
School Of Engineering
Development of novel demountable shear connectors for precast steel-concrete composite bridges
...Show More Authors

Two novel demountable shear connectors for precast steel-concrete composite bridges are presented. The connectors use high-strength steel bolts, which are fastened to the steel beam with the aid of a special locking configuration that prevents slip of bolts within their holes. Moreover, the connectors promote accelerated construction and overcome typical construction tolerances issues of precast structures. Most importantly, the connectors allow bridge disassembly, and therefore, can address different bridge deterioration scenarios with minimum disturbance to traffic flow, i.e. (1) precast deck panels can be rapidly uplifted and replaced; (2) connectors can be rapidly removed and replaced; and (3) steel beams can be replaced, while precast

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Physics: Conference Series
Recovery of temporal coefficient for heat equation from non-local overdetermination conditions
...Show More Authors
Abstract<p>Recovery of time-dependent thermal conductivity has been numerically investigated. The problem of identification in one-dimensional heat equation from Cauchy boundary data and mass/energy specification has been considered. The inverse problem recasted as a nonlinear optimization problem. The regularized least-squares functional is minimised through lsqnonlin routine from MATLAB to retrieve the unknown coefficient. We investigate the stability and accuracy for numerical solution for two examples with various noise level and regularization parameter.</p>
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Integration between value chain analysis and balanced scorecard to for performance evaluation
...Show More Authors

The performance evaluation process requires a set of criteria and for the purpose of measuring the level of performance achieved by the Unit and the actual level of development of its activities, and in view of the changes and of rapid and continuous variables surrounding the Performance is a reflection of the unit's ability to achieve its objectives, as these units are designed to achieve the objectives of exploiting a range of economic resources available to it, and the performance evaluation process is a form of censorship, focusing on the analysis of the results obtained from the achievement All its activities with a view to determining the extent to which the Unit has achieved its objectives using the resources available to it and h

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Strong Convergence of Iteration Processes for Infinite Family of General Extended Mappings
...Show More Authors

View Publication
Scopus (9)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
Hazard Rate Estimation Using Varying Kernel Function for Censored Data Type I
...Show More Authors

     In this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used:  local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
Using jack knife to estimation logistic regression model for Breast cancer disease
...Show More Authors

 

It is considered as one of the statistical methods used to describe and estimate the relationship between randomness (Y) and explanatory variables (X). The second is the homogeneity of the variance, in which the dependent variable is a binary response takes two values  (One when a specific event occurred and zero when that event did not happen) such as (injured and uninjured, married and unmarried) and that a large number of explanatory variables led to the emergence of the problem of linear multiplicity that makes the estimates inaccurate, and the method of greatest possibility and the method of declination of the letter was used in estimating A double-response logistic regression model by adopting the Jackna

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Chaos, Solitons &amp; Fractals
A semi-analytical iterative method for solving nonlinear thin film flow problems
...Show More Authors

View Publication
Crossref (17)
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
2018 Third Scientific Conference Of Electrical Engineering (scee)
An Intelligent Cognitive System Design for Mobile Robot based on Optimization Algorithm
...Show More Authors

View Publication
Scopus (7)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Efficient Algorithm for Fuzzy Linear Fractional Programming Problems via Ranking Function
...Show More Authors

In many applications such as production, planning, the decision maker is important in optimizing an objective function that has fuzzy ratio two functions which can be handed using fuzzy fractional programming problem technique. A special class of optimization technique named fuzzy fractional programming problem is considered in this work when the coefficients of objective function are fuzzy. New ranking function is proposed and used to convert the data of the fuzzy fractional programming problem from fuzzy number to crisp number so that the shortcoming when treating the original fuzzy problem can be avoided. Here a novel ranking function approach of ordinary fuzzy numbers is adopted for ranking of triangular fuzzy numbers with simpler an

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Ieee Transactions On Industrial Electronics
Singular Perturbation-Based Adaptive Integral Sliding Mode Control for Flexible Joint Robots
...Show More Authors

The flexible joint robot (FJR) typically experiences parametric variations, nonlinearities, underactuation, noise propagation, and external disturbances which seriously degrade the FJR tracking. This article proposes an adaptive integral sliding mode controller (AISMC) based on a singular perturbation method and two state observers for the FJR to achieve high performance. First, the underactuated FJR is modeled into two simple second-order fast and slow subsystems by using Olfati transformation and singular perturbation method, which handles underactuation while reducing noise amplification. Then, the AISMC is proposed to effectively accomplish the desired tracking performance, in which the integral sliding surface is designed to reduce cha

... Show More
View Publication
Scopus (52)
Crossref (47)
Scopus Clarivate Crossref