Preferred Language
Articles
/
jcois-563
Study of the hadeeth saying "peace be upon him" ("Allaah is enough for me to solve your harams, and sing me for your goodness")
...Show More Authors

I dealt with this study of one of the hadiths of the Prophet and judged him after studying his deed, especially one of his narrations for the similarity in his name and the name of his father (Abdul Rahman bin Ishaq) Is he a civil "Sadok" or Wasti "weak" and they are in one layer which is called in the science of Hadith (agreed And after a review of Kutkut translations and wound and amendment and other evidence and evidence that it was "weak" and not as he went to him and asserted by the updated Muhammad Nasser al-Din al-Albani may God have mercy on him that in Sindh is a civil rule for the hadeeth "Hassan" and not as said The hadeeth is “weak” because he showed that it is the weak Wasti.
I ask God to be successful in this work and to make him my Lord pure to his face.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 05 2052
Journal Name
Partial Differential Equations In Applied Mathematics
A hybrid analytical method for fractional order Klein–Gordon and Burgers equations
...Show More Authors

Scopus (1)
Scopus
Publication Date
Sat Dec 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
An Energy-Aware and Load-balancing Routing scheme for Wireless Sensor Networks
...Show More Authors

<p>Energy and memory limitations are considerable constraints of sensor nodes in wireless sensor networks (WSNs). The limited energy supplied to network nodes causes WSNs to face crucial functional limitations. Therefore, the problem of limited energy resource on sensor nodes can only be addressed by using them efficiently. In this research work, an energy-balancing routing scheme for in-network data aggregation is presented. This scheme is referred to as Energy-aware and load-Balancing Routing scheme for Data Aggregation (hereinafter referred to as EBR-DA). The EBRDA aims to provide an energy efficient multiple-hop routing to the destination on the basis of the quality of the links between the source and destination. In

... Show More
View Publication Preview PDF
Scopus (28)
Crossref (11)
Scopus Crossref
Publication Date
Sun Oct 05 2025
Journal Name
Mesopotamian Journal Of Computer Science
DGEN: A Dynamic Generative Encryption Network for Adaptive and Secure Image Processing
...Show More Authors

Cyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Feb 23 2026
Journal Name
Journal Of Physical Education
Special Endurance And its Relationship With 10 Km Walking Achievement for Youth
...Show More Authors

View Publication
Publication Date
Fri Feb 01 2013
Journal Name
Journal Of Physical Science And Application
Photobleaching Influence in Different Phases for Coumarin 307 and Acriflavine Laser Dyes
...Show More Authors

Abstract: Under high-excitation irradiance conditions to induce fluorescence, the dependence of photobleaching of Coumarin 307 (C307) and acriflavine (ACF) laser dyes in liquid and solid phases have been studied. A cw LD laser source of 1 mW and 407 nm wavelength was used as an exciting source. For one hour exposure time, it was found that the solid dye samples suffer photobleaching more than the liquid dye samples. This is because in liquid solutions the dye molecules can circulate during the irradiation, while the photobleaching is a serious problem when the dye is incorporated into solid matrix and cannot circulate.

Preview PDF
Publication Date
Wed Mar 01 2023
Journal Name
Results In Engineering
Low-cost autonomous car level 2: Design and implementation for conventional vehicles
...Show More Authors

View Publication
Scopus (33)
Crossref (34)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of The Mechanical Behavior Of Materials
Time and finance optimization model for multiple construction projects using genetic algorithm
...Show More Authors
Abstract<p>Construction contractors usually undertake multiple construction projects simultaneously. Such a situation involves sharing different types of resources, including monetary, equipment, and manpower, which may become a major challenge in many cases. In this study, the financial aspects of working on multiple projects at a time are addressed and investigated. The study considers dealing with financial shortages by proposing a multi-project scheduling optimization model for profit maximization, while minimizing the total project duration. Optimization genetic algorithm and finance-based scheduling are used to produce feasible schedules that balance the finance of activities at any time w</p> ... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s

... Show More
View Publication Preview PDF
Crossref (10)
Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
Traditional and molecular methods for diagnosing bacterial meningitis in Erbil city, Iraq
...Show More Authors

Bacterial meningitis is a leading cause of illness and death worldwide. It is crucial for clinical and public health care, as well as disease control, to identify the meningitis-causing agent promptly. Between June 2021-February 2022, a total of 100 cerebrospinal fluid (CSF) and blood samples were collected from suspected cases of meningitis admitted to Raparin Paediatric Teaching Hospital, Erbil city-Iraq. Cytochemical, cultural, and biochemical tests were conducted, and confirmed by molecular techniques. Bacterial culture findings were positive in 7% of CSF samples and just one positive among blood samples. The most common pathogens found by cultural characteristics and VITEK 2 Compact System were Staphylococcus sciuri in two

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Aug 31 2021
Journal Name
International Journal Of Intelligent Engineering And Systems
FDPHI: Fast Deep Packet Header Inspection for Data Traffic Classification and Management
...Show More Authors

Traffic classification is referred to as the task of categorizing traffic flows into application-aware classes such as chats, streaming, VoIP, etc. Most systems of network traffic identification are based on features. These features may be static signatures, port numbers, statistical characteristics, and so on. Current methods of data flow classification are effective, they still lack new inventive approaches to meet the needs of vital points such as real-time traffic classification, low power consumption, ), Central Processing Unit (CPU) utilization, etc. Our novel Fast Deep Packet Header Inspection (FDPHI) traffic classification proposal employs 1 Dimension Convolution Neural Network (1D-CNN) to automatically learn more representational c

... Show More
View Publication
Scopus (9)
Crossref (8)
Scopus Crossref