Preferred Language
Articles
/
jcois-796
Subject matter  for speakers
...Show More Authors

Praise be to God, Lord of the worlds, and prayers and peace be upon our master Muhammad and upon his family and companions as a whole.
    The topic of attention was drawn to the attention of the speakers, as it made me ponder it carefully, and my goal in that is to know the reason for the interest of the speakers and their care for it, and to clarify from their books the purpose of making this topic one of the advanced investigations with them.

     The idea of ​​writing a paper on the subject of consideration was not absent from my thinking, because I saw the attention of speakers on this issue, as they made it one of the first issues that they deal with studying in their works because they relate to faith in God, glory be to Him, and is linked to the method of inferring the existence of God Almighty which includes meditation on the effects of existence, as Looking at the speakers means that the person charged with the evidence looks at the evidence to move to the science in terms, meaning that you follow the evidence, reflect on it, and observe the effects of work that leads to knowledge of the existence of the mastermind creator. Sorcerer E, and the maker of the author.

     Hence you realize the importance of this topic, and for this reason the speakers expanded its research in terms of stating linguistic and idiomatic meaning, as well as in many other ways, as they discussed the necessity of commissioning in order to arrive at the knowledge of God, glory be to Him, knowledge of His attributes, what he must and impossible to do, and they answered Through this topic, there are many questions related to the matter of consideration, including: Is the commissioning of consideration binding on the public or is it restricted to the private? Is looking useful science or not benefit it? Is knowledge of God Almighty obligatory, or not? What is the origin of this obligation? Is it Sharia or the mind? And other matters related to vision.

     The speakers were not satisfied with that but rather answered all the objections and problems presented by their violators, opposing the evidence that the speakers used to infer and relied on in the ruling that consideration must be given whether these objections are directed to the legal texts inferred or to the consensus that was said or to the mental rules that supported Forensic evidence and consensus.
    That is why I found it appropriate to stand with the phrases of the speakers in an attempt to rearrange and facilitate them, enlightened by the sound scientific method and the sober research context. An approach that combines the Qur’anic statement and the verbal report, so I made my research tagged (the topic of looking at speakers), which includes an introduction, two articles, and a conclusion ..

                                  And Praise be to Allah, the Lord of the Worlds

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Microprocessors And Microsystems
Design considerations for a microprocessor-based Doppler radar
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Wasit Journal Of Computer And Mathematics Science
Dynamic Data Replication for Higher Availability and Security
...Show More Authors

The paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Mon Aug 14 2017
Journal Name
International Journal Of Intelligent Computing And Cybernetics
Two efficient methods for solving Schlömilch’s integral equation
...Show More Authors
Purpose

In this paper, the exact solutions of the Schlömilch’s integral equation and its linear and non-linear generalized formulas with application are solved by using two efficient iterative methods. The Schlömilch’s integral equations have many applications in atmospheric, terrestrial physics and ionospheric problems. They describe the density profile of electrons from the ionospheric for awry occurrence of the quasi-transverse approximations. The paper aims to discuss these issues.

Design/methodology/approach

First, the authors apply a regularization meth

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Developing of bacterial mutagenic assay system for detection
...Show More Authors

Been Antkhav three isolates of soil classified as follows: Bacillus G3 consists of spores, G12, G27 led Pal NTG treatment to kill part of the cells of the three isolates varying degrees treatment also led to mutations urged resistance to streptomycin and rifampicin and double mutations

View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
A4-graph for the twisted group 3D4 (3)
...Show More Authors

Assume that G is a finite group and X = tG where t is non-identity element with t3 = 1. The simple graph with node set being X such that a, b ∈ X, are adjacent if ab-1 is an involution element, is called the A4-graph, and designated by A4(G, X). In this article, the construction of A4(G, X) is analyzed for G is the twisted group of Lie type 3D4(3).

View Publication
Scopus Clarivate Crossref
Publication Date
Tue Dec 13 2022
Journal Name
Lecture Notes In Networks And Systems
Single-Bit Architecture for Low Power IoT Applications
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Thu Mar 23 2023
Journal Name
Journal Of Applied Science And Engineering
Strong Fenchel Duality for Evenly Convex Optimization Problems
...Show More Authors

Among a variety of approaches introduced in the literature to establish duality theory, Fenchel duality was of great importance in convex analysis and optimization. In this paper we establish some conditions to obtain classical strong Fenchel duality for evenly convex optimization problems defined in infinite dimensional spaces. The objective function of the primal problem is a family of (possible) infinite even convex functions. The strong duality conditions we present are based on the consideration of the epigraphs of the c-conjugate of the dual objective functions and the ε-c-subdifferential of the primal objective functions.

View Publication
Scopus (1)
Scopus Clarivate
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
The Correlation between SMBH and SFR for Quasars
...Show More Authors

     A Spectroscopic study has been focused in this article to study one of the main types of active galaxies which are quasars, and to be more precise this research focuses on studying the correlation between the main engine of Quasi-Stellar Objects (QSO), the central black hole mass (SMBH) and other physical properties (e.g. the star formation rate (SFR)). Twelve objects have been randomly selected for “The Half Million Quasars (HMQ) Catalogue” published in 2015 and the data collected from Salon Digital Sky survey (SDSS) Dr. 16. The redshift range of these galaxies were between (0.05 – 0.17). The results show a clear linear proportionality between the SMBH and the SFR, as well as direct proportional between the luminosit

... Show More
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sat Nov 02 2019
Journal Name
Advances In Intelligent Systems And Computing
Spin-Image Descriptors for Text-Independent Speaker Recognition
...Show More Authors

Building a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
A Computerized Integrated System for Geodetic Networks Design
...Show More Authors

This research presents a model for surveying networks configuration which is designed and called a Computerized Integrated System for Triangulation Network Modeling (CISTNM). It focuses on the strength of figure as a concept then on estimating the relative error (RE) for the computed side (base line) triangulation element. The CISTNM can compute the maximum elevations of the highest
obstacles of the line of sight, the observational signal tower height, the contribution of each triangulation station with their intervisibility test and analysis. The model is characterized by the flexibility to select either a single figure or a combined figures network option. Each option includes three other implicit options such as: triangles, quadri

... Show More
View Publication Preview PDF