God sent the Prophet Muhammad as a teacher and promising harbinger {that is sent to the illiterate messenger reciting to them His signs and purifies them and teaches them the Book and Wisdom} [Friday: 2]; the wisdom of Baos Prophet him peace be and am back to teach people, - Education and therefore his life was very rich educational tactics And has passed the Prophet in different circumstances and conditions that can be experienced by a teacher or educator in any time, anywhere; there is no case of going through the educator or teacher only finds the same or similar or likened to, or close to it in the life of the Prophet peace be upon him Prophet has lived God's peace be upon his strengths and weaknesses, victory and defeat, he lived orphanhood and paternity .. was deals with every stage and every case including matching. Prophet has treated with the community groups, and called on them, and taught them the best upbringing; with the rigors of their hearts and the roughness of morals, and staleness temperament and repulsion moods, Vaanml Prophet (peace be upon him) what are its staleness, and patience them harm, so they the best nation after it did not have the value and weight of {although they had been before in manifest error that the biography of the Prophet Mohammed and directed educational classes of society and is essential for the breeding source, which besides a great educational school came Avmaz men, and professors of generations, and the masters of thought, and the teachers of morality; one of them was an imam to pray, and a judge in the litigation, and preacher in the communities, and in mufti issues. The most important recommendations that came out of the search: ensuring young people and warn them of places sedition, or delve into the similarities and youth Welfare follow the safety of their faith and concern for the wisdom in the calendar Aauajjaj
Conclusion
After this tour with Alkhund Al-Khurasani and his book “Adequacy of Fundamentals,” we can highlight the results we have got through what we have reviewed in the research:
- Al-Akhund Al-Khurasani was born and raised in a scientific environment that gave him from his childhood the opportunity to gain knowledge of achievement. Therefore, he left to seek knowledge from the beginning of his youth and toured the cities, then he went to Tehran and then He went to the holy city of Najaf, then left for Samarra, then returned to Najaf in order to work on the scholars and the student.
- Al Akhund al-Khorasani studied on several scholars , whether in Iraq or in Geran, and he
The research aims to identify: 1-Designing a test to measure the movement compatibility of the eye and the leg for the students of the Faculty of Physical Education and Sports Sciences, Samarra University. 2-Codification (setting scores and standard levels) for the results of the motor compatibility test for the eye and the leg for students of the Faculty of Physical Education and Sports Sciences, Samarra University. The researchers reached the some following conclusions: 1-A test to measure the movement compatibility of the eye and the leg for the students of the Faculty of Physical Education and Sports Sciences. 2-There is a discrepancy in the standard levels of the research sample.
User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreIn this paper, an efficient image segmentation scheme is proposed of boundary based & geometric region features as an alternative way of utilizing statistical base only. The test results vary according to partitioning control parameters values and image details or characteristics, with preserving the segmented image edges.
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreSM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show More