This paper examines the most important historical knowledge and knowledge of the Arabs in the pre-Islamic era based on the Holy Quran, which is the oldest and most reliable Arab Islamic sources recorded at all, as a major source of this study, to ensure a great interest in history, especially the news of the prophets, and the positions of their nations Some of them, as well as some of the news of the old Arab people such as Aad and Thamud and the owners of the elephant and others, and some of which are repeated in several Quranic fence and various methods of presentation, cited as a lesson and exhortation to the Arab opponents of Islam and a reminder of what befell the peoples of the world B relict of doom to discredit them the apostles and prophets, as well as that the contents of the Koran are clear signals about the history and important events that took place in the pre-Islamic era.
The historical facts and archaeological revelations reached by historians and archaeologists in the nineteenth century proved the accuracy and accuracy of the news in the Holy Quran of the old Arab people. We may go further and say that it is very likely that the Arabs have books, newspapers, and papers that have written the news and historical knowledge in the pre-Islamic era, especially the era before the Prophet's mission, and if not reached us, based on what inspires us verses The Holy Quran.
In many applications such as production, planning, the decision maker is important in optimizing an objective function that has fuzzy ratio two functions which can be handed using fuzzy fractional programming problem technique. A special class of optimization technique named fuzzy fractional programming problem is considered in this work when the coefficients of objective function are fuzzy. New ranking function is proposed and used to convert the data of the fuzzy fractional programming problem from fuzzy number to crisp number so that the shortcoming when treating the original fuzzy problem can be avoided. Here a novel ranking function approach of ordinary fuzzy numbers is adopted for ranking of triangular fuzzy numbers with simpler an
... Show More<p>Energy and memory limitations are considerable constraints of sensor nodes in wireless sensor networks (WSNs). The limited energy supplied to network nodes causes WSNs to face crucial functional limitations. Therefore, the problem of limited energy resource on sensor nodes can only be addressed by using them efficiently. In this research work, an energy-balancing routing scheme for in-network data aggregation is presented. This scheme is referred to as Energy-aware and load-Balancing Routing scheme for Data Aggregation (hereinafter referred to as EBR-DA). The EBRDA aims to provide an energy efficient multiple-hop routing to the destination on the basis of the quality of the links between the source and destination. In
... Show MoreKE Sharquie, AA Noaimi, SD Hameed, Journal of Cosmetics, Dermatological Sciences and Applications, 2013 - Cited by 15
In aspect-based sentiment analysis ABSA, implicit aspects extraction is a fine-grained task aim for extracting the hidden aspect in the in-context meaning of the online reviews. Previous methods have shown that handcrafted rules interpolated in neural network architecture are a promising method for this task. In this work, we reduced the needs for the crafted rules that wastefully must be articulated for the new training domains or text data, instead proposing a new architecture relied on the multi-label neural learning. The key idea is to attain the semantic regularities of the explicit and implicit aspects using vectors of word embeddings and interpolate that as a front layer in the Bidirectional Long Short-Term Memory Bi-LSTM. First, we
... Show MoreElectronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show More