In the name of of Allah the Merciful
Praise be to God, and blessings and peace be upon the Messenger of God, Muhammad, and upon his family and his family and peace, and after:
The honor of every knowledge of honor is related to it, and since the science of interpretation is related to the Book of God Almighty; it is considered one of the most noble and longest of sciences, and this science began long ago as the early ages of Islam have expanded the Islamic state, and people entered the religion of God in cohorts, and the mixture mixed In tongues, and people did not know much about the meanings of the Qur’an, so the need for authorship in this great knowledge was severe, and perhaps one of the first to write about the meanings of the Qur’an (Abu Ubaidah) in his book (The Metaphor of the Qur’an), Abu Ubaidah was influenced by his specialization in Arabic science, which made it the feature Notable for his book.
I found that many researchers took up this book with study from the linguistic, grammatical, and morphological fields, but I did not find anyone who talked about the explanatory aspects in it, hence the idea to write this research which deals with (Abu Ubaidah's interpretative approach in the metaphor of the Qur’an).
I have dealt with this book by reading, to determine the features of the approach taken by Abu Ubaida in it and which I will mention in the folds of the research plan shortly, and I took it upon myself to demonstrate what I decided for him by hitting some examples from his book to explain this and then compare it with other specialists, to see the extent of his approval Or his contradiction with them, knowing that the difference between him and those who joined him was that he wrote his book before the features of the interpreters' curricula became clear, and before specific rules were set for them.
The research was divided into an introduction, and three sections: I dedicated the first topic: to talk about the life and knowledge of Abu Ubaidah, and the second topic: on the approach of Abu Ubaidah in the interpretation of the dictum, and there are four requirements: the first demand: in the interpretation of the Qur’an in the Qur’an, and the second requirement in the interpretation of the Qur’an in the Sunnah And the third requirement: in the interpretation of the Qur’an with the sayings of the companions, the followers, and the fourth requirement on: the interpretation of the Qur’an with the reasons for descent, and the third topic: in the interpretation of Abu Ubaidah the Qur’an with an opinion, and it has five requirements: the first requirement: the interpretation of the Qur’an in the language, and the second requirement: the interpretation of the Qur’an with dependence as , And the third requirement: the interpretation of the Qur’an relying on a For Arab poetry, and the fourth requirement: Interpretation of the Qur’an by multiplying proverbs, and then concluded the research with the most important findings.
I have referred in that to the mothers of the books in the interpretation, language, hadith, translations, and others, and if I was injured, then God is the best and has the grace. To God, Lord of the worlds.
In this study, the researcher aims to analyze the content of the physics textbook for the 3rd intermediate grade according to the criteria for designing and producing infographics, and the research community consists of the content of the physics textbook for the 3rd intermediate grade intermediate grade for the academic year 2021-2022. The researcher adopted the analysis instruments with a number of the criteria for designing and producing infographics. The results revealed randomness in the percentage of the criteria included in the content of the physics textbook for the 3rd intermediate grade, and they are not compatible with the proposed criteria by the experts also.
Excessive skewness which occurs sometimes in the data is represented as an obstacle against normal distribution. So, recent studies have witnessed activity in studying the skew-normal distribution (SND) that matches the skewness data which is regarded as a special case of the normal distribution with additional skewness parameter (α), which gives more flexibility to the normal distribution. When estimating the parameters of (SND), we face the problem of the non-linear equation and by using the method of Maximum Likelihood estimation (ML) their solutions will be inaccurate and unreliable. To solve this problem, two methods can be used that are: the genetic algorithm (GA) and the iterative reweighting algorithm (IR) based on the M
... Show MoreObjective the research is to identify Over the Commitment of a Rushed Bank in Baghdad has applied social responsibility in accordance with ISO 26000 by measuring and diagnosing the gap between the actual reality in the bank and the requirements of the standard.
HM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023
This study describes how fuzzy logic control FLC can be applied to sonars of mobile robot. The fuzzy logic approach has effects on the navigation of mobile robots in a partially known environment that are used in different industrial and society applications. The fuzzy logic provides a mechanism for combining sensor data from all sonar sensors which present different information. The FLC approach is achieved by means of Fuzzy Decision Making method type of fuzzy logic controller. The proposed controller is responsible for the obstacle avoidance of the mobile robot while traveling through a map from a home point to a goal point. The FLC is built as a subprogram based on the intelligent architecture (IA). The software program uses th
... Show MoreWith the increasing reliance on microgrids as flexible and sustainable solutions for energy distribution, securing decentralized electricity grids requires robust cybersecurity strategies tailored to microgrid-specific vulnerabilities. The research paper focuses on enhancing detection capabilities and response times in the face of coordinated cyber threats in microgrid systems by implementing advanced technologies, thereby supporting decentralized operations while maintaining robust system performance in the presence of attacks. It utilizes advanced power engineering techniques to strengthen cybersecurity in modern power grids. A real-world CPS testbed was utilized to simulate the smart grid environment and analyze the impact of cyberattack
... Show MoreIn this paper we used frequentist and Bayesian approaches for the linear regression model to predict future observations for unemployment rates in Iraq. Parameters are estimated using the ordinary least squares method and for the Bayesian approach using the Markov Chain Monte Carlo (MCMC) method. Calculations are done using the R program. The analysis showed that the linear regression model using the Bayesian approach is better and can be used as an alternative to the frequentist approach. Two criteria, the root mean square error (RMSE) and the median absolute deviation (MAD) were used to compare the performance of the estimates. The results obtained showed that the unemployment rates will continue to increase in the next two decade
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show More