Preferred Language
Articles
/
jcois-803
Explanation of the book Al-I'tikaaf  From the Al-Dura system            Luminous - of the Sarsi Hanbali brand
...Show More Authors

Praise be to God, Lord of the worlds, and peace and blessings be upon our master Muhammad, and upon his whole family and companions, but after: God Almighty has instituted types of acts of worship and classes of obedience that, if performed by the servant, would link him with his Creator and connect with his Lord. And for the sake of these worship, and the greatest of them: the worship of i'tikaaf, for souls need rest and recuperation from the struggle of life and its concerns, concerns and anguish, and people differ in their attitudes and interests in the means of recreation, and many people consider the outing and travel the best way in which they breathe from their toil and toil, and reclaim their strength and the advised adult He finds that the best way for him to relax and live in peace with her calm and reassuring is the remembrance of God Almighty: لا Do not the remembrance of God rest assured of hearts  (). And his complete happiness is to take refuge in the homes of God and its neighborhoods through prayer, remembrance and retreat. In the vastness of God’s homes, the believer takes pleasure in unparalleled enjoyment, goes to an unparalleled comfort, and emerges from his distress unscathed with contentment and surrender, and discloses that infallible: A group weakens his prayer in his home, and in his market twenty-five degrees, because if he performs ablution
He did good ablution, then he went out to the prayer, and he does not take it out except the prayer. Prayer)( ) . In the confines of prayer, a person harms himself to a strong corner, wielding him from error, and helps him with the misfortunes of eternity, and guides him to the right path:  O those who believe, seek patience and pray, for God is with those who are patient ()). And if walking to prayer and waiting for prayer raises one to high positions and high levels, then staying in mosques and observing there days and nights rises to the servant to the point of peasantry, the Prophet says : (And whoever observes a day seeking the face of God, God makes between him and the fire three trenches, each trench Beyond the beater) (). I'tikaaf and the need for obedience to the mosques are one of the closest angels who do not deflect from the worship of God, and the one who remembers his remembrance of God is close to his master, and he is happy and happy. For the sake of all this, this humble research, marked with (Explanation of the Book of I'tikaaf from the Orphaned Dura System) came to the scholar Imam al-Sarasri al-Hanbali, may God Almighty have mercy on him, and the reason for choosing this system is due to two things:
1- The ease of preserving the system for the seeker of Islamic knowledge.
2- The great status of the author, may God have mercy on him, among Hanbalis and among Muslim scholars in general.
      This system has been printed recently, and through my extensive search for explanations for it, I did not stand for an explanation of it, so I liked that my explanation of the book on i'tikaaf should be the beginning of an explanation of this great, great destiny revealed .. And the last of our prayers is that praise be to God, Lord of the Worlds.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 14 2025
Journal Name
South Eastern European Journal Of Public Health
Deep learning-based threat Intelligence system for IoT Network in Compliance With IEEE Standard
...Show More Authors

The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre

... Show More
View Publication
Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Wed May 15 2019
Journal Name
Al-khwarizmi Engineering Journal
Mesoporous Silica MCM-41 as a Carriers Material for Nystatine Drug in Delivery System
...Show More Authors

In the present study, MCM-41 was synthesis as a carrier for poorly drugs soluble in water, by the sol-gel technique. Textural and chemical characterizations of MCM-41 were carried out by X-ray diffraction (XRD), Fourier transform infrared (FTIR), scanning electron microscope (SEM), and thermal gravimetric analysis (TGA). The experimental results were analyzed mesoporous carriers MCM-41. With maximum drug loading efficiency in MCM-41 determined to be 90.74%. The NYS released was prudently studied in simulated body fluid (SBF) pH 7.4 and the results proved that the release of NYS from MCM-41 was (87.79%) after 18 hr. The data of NYS released was found to be submitted a Weibull model with a correlation coefficient of (0.995). The Historical

... Show More
View Publication Preview PDF
Crossref (14)
Crossref
Publication Date
Sun Jun 08 2025
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Secure E-Voting System Utilizing Fingerprint Authentication, AES-GCM Encryption and Hybrid Blind Watermarking
...Show More Authors

Ensuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jan 04 2021
Journal Name
Multimedia Tools And Applications
Attention enhancement system for college students with brain biofeedback signals based on virtual reality
...Show More Authors

View Publication
Scopus (5)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Clarifying Optimum Setting Temperatures and Airflow Positions for Personal Air Conditioning System on Flight
...Show More Authors

In recent years, the demand for air travel has increased and many people have traveled by plane. Most passengers, however, feel stressed due to the limited cabin space. In order to make these passengers more comfortable, a personal air-conditioning system for the entire chair is needed. This is because the human body experiences discomfort from localized heating or cooling, and thus, it is necessary to provide appropriate airflow to each part of the body. In this paper, a personal air-conditioning system, which consists of six vertically installed air-conditioning vents, will be proposed. To clarify the setting temperature of each vent, the airflow around the passenger and the operative temperature of each part of the body is investigate

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Dec 18 2017
Journal Name
Al-khwarizmi Engineering Journal
High Order Sliding Mode Observer-Based Output Feedback Controller Design For Electro-Hydraulic System
...Show More Authors

A perturbed linear system with property of strong observability ensures that there is a sliding mode observer to estimate the unknown form inputs together with states estimation. In the case of the electro-hydraulic system with piston position measured output, the above property is not met. In this paper, the output and its derivatives estimation were used to build a dynamic structure that satisfy the condition of strongly observable. A high order sliding mode observer (HOSMO) was used to estimate both the resulting unknown perturbation term and the output derivatives. Thereafter with one signal from the whole system (piton position), the piston position make tracking to desire one with a simple linear output feedback controller after ca

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
13th International Symposium On Fiber-reinforced Polymer Reinforcement For Concrete Structures Frprcs 13
CFRP Repairing System at Openings in Reinforced Concrete T-Beams Cracked by Impact Loads
...Show More Authors

Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
...Show More Authors

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Tue Oct 29 2019
Journal Name
Journal Of Engineering
Demand Priority in a Power System With Wind Power Contribution Load Shedding Scheme Based
...Show More Authors

The load shedding  scheme has been extensively implemented as a fast solution for unbalance conditions. Therefore, it's crucial to investigate supply-demand balancing in order to protect the network from collapsing and to sustain stability as possible, however its implementation is mostly undesirable. One of the solutions to minimize the amount of load shedding is the integration renewable energy  resources, such as wind power, in the electric power generation could contribute significantly to minimizing power cuts as it is ability to positively improving the stability of the electric grid. In this paper propose a method for shedding the load base on the priority demands with incorporating the wind po

... Show More
View Publication Preview PDF
Crossref (9)
Crossref