Preferred Language
Articles
/
jcois-286
Balance and moderation in dealing with the oppressor and the oppressed in the Sunnah - "Applied models")
...Show More Authors

Research Summary

In The Name of Allah Most Gracious Most Merciful

The word injustice and its derivatives were repeated in the Holy Qur’an in several places, approximately (154) times. This is due to the severity of its danger, and that the most dangerous thing that our Islamic nation suffers from in our time is; It is injustice in all its forms and types, so we should all have an honest review of the sincere change in the right direction, and uncover cases of injustice and explain their causes and causes, and work to treat them and rid the wrongdoers of their injustice, and help them to correct their condition. To reveal their grievances and explain their causes and causes, and work to remedy them, and support them and mitigate what they are in, and I will focus in this research on the injustice that occurs among the servants themselves; This is because it is very common in our time, and it is underestimated by the wrongdoers. From here, I chose this title, in which I will pause on the purified hadiths of the Prophet, and how they dealt with the oppressors and the oppressed, and how they dealt with this issue, and the research on this topic may be long, but I will stand on important vocabulary for this topic, and we will open a window on such important matters In a place, my description - the oppressor and the oppressed - are inseparable, so there is no oppressor without the oppressed, nor the oppressed without the oppressor, and I divided my research into two topics; The first is in: The Prophet’s method in dealing with injustice and oppressors. It began by defining injustice in language and idiomatically. I divided it into two requirements; The first: immunizing people from falling into injustice. The second: the prophetic treatment in dealing with injustice in the event of its occurrence. And I divided it into two parts: the first: the etiquette of dialogue with the oppressors, and the second: helping the oppressors to get rid of their oppression. As for the second topic, it was about: the prophetic method in dealing with the oppressed. I started it by defining the oppressed linguistically and idiomatically, and divided the topic into two requirements: the first: protecting people from falling into grievances before they happen. The second: Dealing with the purified Sunnah with the victim after it occurred.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 30 2021
Journal Name
Iraqi Journal Of Science
Small Binary Codebook Design for Image Compression Depending on Rotating Blocks
...Show More Authors

     The searching process using a binary codebook of combined Block Truncation Coding (BTC) method and Vector Quantization (VQ), i.e. a full codebook search for each input image vector to find the best matched code word in the codebook, requires a long time.   Therefore, in this paper, after designing a small binary codebook, we adopted a new method by rotating each binary code word in this codebook into 900 to 2700 step 900 directions. Then, we systematized each code word depending on its angle  to involve four types of binary code books (i.e. Pour when , Flat when  , Vertical when, or Zigzag). The proposed scheme was used for decreasing the time of the coding pro

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Aug 28 2020
Journal Name
Iraqi Journal Of Science
De-Noising of Corrupted Fluoroscopy Images Based on a New Multi-Line Algorithm
...Show More Authors

 Fluoroscopic images are a field of medical images that depends on the quality of image for correct diagnosis; the main trouble is the de-nosing and how to keep the poise between degradation of noisy image, from one side, and edge and fine details preservation, from the other side, especially when fluoroscopic images contain black and white type noise with high density. The previous filters could usually handle low/medium black and white type noise densities, that expense edge, =fine details preservation and fail with high density of noise that corrupts the images. Therefore, this paper proposed a new Multi-Line algorithm that deals with high-corrupted image with high density of black and white type noise. The experiments achieved i

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon May 01 2023
Journal Name
Journal Of Engineering
Producing Sustainable Roller Compacted Concrete by Using Fine Recycled Concrete Aggregate
...Show More Authors

One-third of the total waste generated in the world is construction and demolition waste. Reducing the life cycle of building materials includes increasing their recycling and reuse by using recycled aggregates. By preventing, the need to open new aggregate quarries and reducing the amount of construction waste dumped into landfills, the use of recycled concrete aggregate in drum compacted concrete protects the environment. Four samples of PRCC were prepared for testing (compressive strength, tensile strength, flexural strength, density, water absorption, porosity) as the reference mix and (10, 15, and 20%) of fine recycled concrete aggregate as a partial replacement for fine natural aggregate by volume. The mix is designed according to

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Authentication of Digital Video Encryption
...Show More Authors

The security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Extend Nearly Pseudo Quasi-2-Absorbing submodules(I)
...Show More Authors

The concept of a 2-Absorbing submodule is considered as an essential feature in the field of module theory and has many generalizations. This articale discusses the concept of the Extend Nearly Pseudo Quasi-2-Absorbing submodules and their relationship to the 2-Absorbing submodule, Quasi-2-Absorbing submodule, Nearly-2-Absorbing submodule, Pseudo-2-Absorbing submodule, and the rest of the other concepts previously studied. The relationship between them has been studied, explaining that the opposite is not true and that under certain conditions the opposite becomes true. This article aims to study this concept and gives the most important propositions, characterizations, remarks, examples, lemmas, and observations related to it. In the en

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 31 2021
Journal Name
Iraqi Journal Of Science
Some Geometric Properties for a Certain Class of Meromorphic Univalent Functions by Differential Operator
...Show More Authors

The major target of this paper is to study a confirmed class of meromorphic univalent functions . We procure several results, such as those related to coefficient estimates, distortion and growth theorem, radii of starlikeness, and convexity for this class, n additionto hadamard product, convex combination, closure theorem, integral operators, and  neighborhoods.

View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Sep 04 2016
Journal Name
Baghdad Science Journal
Some Results on Weak Essential Submodules
...Show More Authors

Throughout this paper R represents commutative ring with identity and M is a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of weak essential submodules which introduced by Muna A. Ahmed, where a submodule N of an R-module M is called weak essential, if N ? P ? (0) for each nonzero semiprime submodule P of M. In this paper we rewrite this definition in another formula. Some new definitions are introduced and various properties of weak essential submodules are considered.

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Baghdad Science Journal
S-maximal Submodules
...Show More Authors

Throughout this paper R represents a commutative ring with identity and all R-modules M are unitary left R-modules. In this work we introduce the notion of S-maximal submodules as a generalization of the class of maximal submodules, where a proper submodule N of an R-module M is called S-maximal, if whenever W is a semi essential submodule of M with N ⊊ W ⊆ M, implies that W = M. Various properties of an S-maximal submodule are considered, and we investigate some relationships between S-maximal submodules and some others related concepts such as almost maximal submodules and semimaximal submodules. Also, we study the behavior of S-maximal submodules in the class of multiplication modules. Farther more we give S-Jacobson radical of rings

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Baghdad Science Journal
S-maximal Submodules
...Show More Authors

Throughout this paper R represents a commutative ring with identity and all R-modules M are unitary left R-modules. In this work we introduce the notion of S-maximal submodules as a generalization of the class of maximal submodules, where a proper submodule N of an R-module M is called S-maximal, if whenever W is a semi essential submodule of M with N ? W ? M, implies that W = M. Various properties of an S-maximal submodule are considered, and we investigate some relationships between S-maximal submodules and some others related concepts such as almost maximal submodules and semimaximal submodules. Also, we study the behavior of S-maximal submodules in the class of multiplication modules. Farther more we give S-Jacobson radical of ri

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Impacts of Denial-of-Service Attack on Energy Efficiency Pulse Coupled Oscillator
...Show More Authors

The Pulse Coupled Oscillator (PCO) has attracted substantial attention and widely used in wireless sensor networks (WSNs), where it utilizes firefly synchronization to attract mating partners, similar to artificial occurrences that mimic natural phenomena. However, the PCO model might not be applicable for simultaneous transmission and data reception because of energy constraints. Thus, an energy-efficient pulse coupled oscillator (EEPCO) has been proposed, which employs the self-organizing method by combining biologically and non-biologically inspired network systems and has proven to reduce the transmission delay and energy consumption of sensor nodes. However, the EEPCO method has only been experimented in attack-free networks without

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref