Preferred Language
Articles
/
jperc-1126
Awareness of Students at Imam Muhammad bin Saud Islamic University of the Requirements of Married Life in the Light of Social Changes and Methods of Deepening It in Accordance with an Islamic Educational Vision
...Show More Authors

This study aims to identify the level of students’ awareness at Imam Muhammad bin Saud University of the requirements of married life in the light of social changes and suggested methods to deepen this awareness (according to the Islamic educational vision) from their own perspective. In this study, the researcher used the descriptive approach with a survey research method, depending on questionnaires to collect data, which he applied to students of College of Sharia in Imam Muhammad bin Saud Islamic University, as well as, students in the fields of Sociology, Social Work, and Psychology in the College of Social Sciences. The findings of the study revealed that students are aware of the requirements of married life concerning mutual rights. In addition, female students are aware of the rights of both husband and wife. The level of awareness of the aforementioned is moderate; students have also shown a moderate level of awareness about dealing with matrimonial disputes. Female respondents are more aware than male respondents of the requirements of married life, the study has illustrated that there are no differences in awareness between married and unmarried students in this regard. Finally, the respondent’s field of study has no impact on the level of awareness of the requirements of married life. Moreover, this study indicated that the methods suggested deepening the awareness of students of the requirements of married life at Imam Muhammad bin Saud University in the light of social changes (in accordance with Islamic Education) from their own perspective have gained a moderate degree of approval.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Sun Aug 08 2021
Journal Name
Proceedings Of International Conference On Emerging Technologies And Intelligent Systems
Drone Altitude Control Using Proportional Integral Derivative Technique and Recycled Carbon Fiber Structure
...Show More Authors

View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
2023 Ieee 36th International Symposium On Computer-based Medical Systems (cbms)
Toward a Minimal sEMG Setup for Knee and Ankle Kinematic Estimation during Gait
...Show More Authors

View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (37)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Journal Of Engineering
Deep Learning-Based Segmentation and Classification Techniques for Brain Tumor MRI: A Review
...Show More Authors

Early detection of brain tumors is critical for enhancing treatment options and extending patient survival. Magnetic resonance imaging (MRI) scanning gives more detailed information, such as greater contrast and clarity than any other scanning method. Manually dividing brain tumors from many MRI images collected in clinical practice for cancer diagnosis is a tough and time-consuming task. Tumors and MRI scans of the brain can be discovered using algorithms and machine learning technologies, making the process easier for doctors because MRI images can appear healthy when the person may have a tumor or be malignant. Recently, deep learning techniques based on deep convolutional neural networks have been used to analyze med

... Show More
View Publication Preview PDF
Crossref (11)
Crossref
Publication Date
Sat Nov 01 2025
Journal Name
Journal Of Molecular Liquids
Chitosan salt as a dual-function agent for CO₂ sequestration and acidizing enhancement
...Show More Authors

The utilization of carbon dioxide (CO₂) to enhance wellbore injectivity presents a cost-effective and sustainable strategy for mitigating greenhouse gas emissions while improving reservoir performance. This study introduces an environmentally friendly method employing a water-soluble chitosan salt (CS) that generates a carbonated-rich acid solution upon contact with dry CO₂ at 25 °C and 508 psi. CS solutions (100–2000 ppm) were prepared and evaluated for CO₂ uptake, acid generation, and rheological behavior. Results show that 1000 ppm achieves an optimal CO2 uptake (2612 mg/l), with moderate viscosity increase (from 1.52 to 3.37 cp), while higher concentrations exhibit a sharp rise due to polymer-like network formation. Core floodi

... Show More
View Publication
Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Educational And Psychological Researches
أنماط الشخصية وعلاقتها بأسلوبي التفكير ( اللفظي – التصوري) لدى طلبة قسم التربية الفنية
...Show More Authors

يَهدف البحث الحالي الى تعرف نمطي الشخصية (أ.ب) وكذلك اسلوبي التفكير (اللفظي – التصوري) لدى طلبة كلية الفنون الجميلة – قسم التربية الفنية .

ومن اجل تحقيق اهداف البحث والتعرف على نمطي الشخصية (أ.ب) فقد اختار الباحث (مقياس كلازر ، 1978) الذي تم استعماله في دراسة ( العاني ، 2013) والذي يتمتع بصدق وثبات جيدين ، ومقياس اسلوبي التفكير (اللفظي والتصوري) لـ(الطائي ،2018) المبني وفق نظرية التشفير الثنائي لمنظرها ( بايفيو – PIAV

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Risk-Based Inspection Due to Corrosion Consequences for Oil and Gas Flowline: A Review
...Show More Authors

   The petroleum industry, which is one of the pillars of the national economy, has the potential to generate vast wealth and employment possibilities. The transportation of petroleum products is complicated and changeable because of the hazards caused by the corrosion consequences. Hazardous chemical leaks caused by natural disasters may harm the environment, resulting in significant economic losses. It significantly threatens the aim for sustainable development. When a result, determining the likelihood of leakage and the potential for environmental harm, it becomes a top priority for decision-makers as they develop maintenance plans. This study aims to provide an in-depth understanding of the risks associated with oil and gas pipeli

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Jun 30 2013
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Zinc Element Traces to Inhibit Scale Formation on Cooling Tower and Air Cooler Systems
...Show More Authors

Calcium carbonate is predominantly present in aqueous systems, which is
commonly used in industrial processes. It has inverse solubility characteristics
resulting in the deposition of scale on heat transfer surface. This paper focuses on
developing methods for inhibition of calcium carbonate scale formation in cooling
tower and air cooler system where scaling can cause serious problems, ZnCl 2 and ZnI
2 has been investigated as scale inhibitor on AISI 316 and 304. ZnCl 2 were more
effective than ZnI 2 in both systems, and AISI 316 show more receptivity to the
chlorides salt compared to AISI 304. The inhibitors were more effective in cooling
tower than air cooler system. AISI 316 show more constant inhibition effic

... Show More
View Publication Preview PDF