Preferred Language
Articles
/
jperc-1142
Features of the approach the Great Prophet Muhammad in Education
...Show More Authors

God sent the Prophet Muhammad as a teacher and promising harbinger {that is sent to the illiterate messenger reciting to them His signs and purifies them and teaches them the Book and Wisdom} [Friday: 2]; the wisdom of Baos Prophet him peace be and am back to teach people, - Education and therefore his life was very rich educational tactics And has passed the Prophet in different circumstances and conditions that can be experienced by a teacher or educator in any time, anywhere; there is no case of going through the educator or teacher only finds the same or similar or likened to, or close to it in the life of the Prophet peace be upon him Prophet has lived God's peace be upon his strengths and weaknesses, victory and defeat, he lived orphanhood and paternity .. was deals with every stage and every case including matching. Prophet has treated with the community groups, and called on them, and taught them the best upbringing; with the rigors of their hearts and the roughness of morals, and staleness temperament and repulsion moods, Vaanml Prophet (peace be upon him) what are its staleness, and patience them harm, so they the best nation after it did not have the value and weight of {although they had been before in manifest error that the biography of the Prophet Mohammed and directed educational classes of society and is essential for the breeding source, which besides a great educational school came Avmaz men, and professors of generations, and the masters of thought, and the teachers of morality; one of them was an imam to pray, and a judge in the litigation, and preacher in the communities, and in mufti issues. The most important recommendations that came out of the search: ensuring young people and warn them of places sedition, or delve into the similarities and youth Welfare follow the safety of their faith and concern for the wisdom in the calendar Aauajjaj

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue May 01 2012
Journal Name
Iraqi Journal Of Physics
Early detection of breast cancer mass lesions by mammogram segmentation images based on texture features
...Show More Authors

Mammography is at present one of the available method for early detection of masses or abnormalities which is related to breast cancer. The most common abnormalities that may indicate breast cancer are masses and calcifications. The challenge lies in early and accurate detection to overcome the development of breast cancer that affects more and more women throughout the world. Breast cancer is diagnosed at advanced stages with the help of the digital mammogram images. Masses appear in a mammogram as fine, granular clusters, which are often difficult to identify in a raw mammogram. The incidence of breast cancer in women has increased significantly in recent years.
This paper proposes a computer aided diagnostic system for the extracti

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Tue Apr 24 2018
Journal Name
Journal Of The American Geriatrics Society
A Systems Approach to Identify Factors Influencing Adverse Drug Events in Nursing Homes
...Show More Authors

The objectives of the study were to identify the incidence rate and characteristics of adverse drug events (ADEs) in nursing homes (NHs) using the ADE trigger tool and to evaluate the relationships between resident and facility work system factors and incidence of ADEs using the System Engineering Initiative for Patient Safety (SEIPS) model. The study used 2 observational quantitative methods, retrospective resident chart extraction, and surveys. The participating staff included Directors of nursing, registered nurses, certified nurse assistants (CNAs). Data were collected from fall 2016 to spring 2017 from 11 NHs in 9 cities in Iowa. Binary logistic regression with generalized estimated equations was used to measure the association

... Show More
View Publication
Scopus (25)
Crossref (28)
Scopus Clarivate Crossref
Publication Date
Thu Oct 22 2020
Journal Name
2020 4th International Symposium On Multidisciplinary Studies And Innovative Technologies (ismsit)
Artificial Intelligence in Smart Agriculture: Modified Evolutionary Optimization Approach for Plant Disease Identification
...Show More Authors

View Publication
Scopus (10)
Crossref (6)
Scopus Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Sep 29 2021
Journal Name
College Of Islamic Sciences
The position of Al-Jassas (D. 370 AH) of the verses of "As-Sifat Al-Khbriya"
...Show More Authors

 

This research aims at know the position of Al-Jassas Al- Hanafi (D. 370 AH) of  "As-Sifat Al- Khbriya", through his interpretation: (the provisions of Qur'an), by studying his interpretation of the verses related to this issue.

The most significant results of this study that Al-Jassas did not consider the words that called: "As-Sifat Al- Khbriya" as adjectives to Allah almighty, but he consider them contained an inappropriate meaning to Allah almighty, thus it must be referred to the perfect arbitrator, so he was believe in opinion of interpretation. and interpretations of Al-Jassas for the related of the Qur'an verses relat

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Environmental Nanotechnology Monitoring & Management
Green approach for the synthesis of graphene glass hybrid as a reactive barrier for remediation of groundwater contaminated with lead and tetracycline
...Show More Authors

Scopus (17)
Crossref (3)
Scopus Crossref
Publication Date
Sun May 10 2015
Journal Name
Al-academy
Wagner ideas and architectural scene Bayreuth ideal: علي عبد الله
...Show More Authors

The (Richard Wagner) of cultural figures rare collected between philosophy and literature and the arts to reach the concept of the artwork destruction (Gesamtkunstwerk), who called for by the movement romantic, he is a thinker, and composer renewed, and playwright, designer and architect of a special kind.Able ( Wagner ) that translates his thoughts technical and design in the field of opera and disclose those ideas models actual dealt joints essential this art heritage, which was developed and laid his modern rules approach by achieving his dream creates theater ideal, which was held in the city ( Bayreuth) in ( Bavaria ), one of the German Federal States .The study reviews the ideas of Wagner and their sources, which have had an import

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 15 2020
Journal Name
Al-academy
Recycling evening dresses into modern dresses with traditional features: ليلى عبد الغفار فدا
...Show More Authors

  This research aims to harmonize contemporary and traditional clothes, also expenses and savings. It is done by recycling evening clothes into Clothes with traditional features. The study followed descriptive explanatory approach. The sample consisted of seven dresses, as well as 208 female participants from Makkah Al-Mukarramah province, the age range was between 21 and 65 years old. An electronic questionnaire was distributed and the stability and reliability of the internal consistency were measured.
The research resulted in the ability to recycle evening dresses into modern clothes with traditional characteristics. It also confirmed that the reason of wearing traditional clothes is spirituality of the month of Ramadan. Addi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More