There is a long-established discussion among Quran interpreters which with interrelationship and Quran systems. Although many interpreters and Quran experts assumed that there is alink between parts of verse and its adjacent verses, But there is a lot of disagreement about other aspects of such interlinks and interrelationships. Some refuse subject unity of verses and other reject relationship between Surah and its subject. Therefore such disagreements and discussions require getting to certain perspectives which take all aspects and point of views into consideration.
Issam al-Din al-Asfrani's footnote
On the interpretation of the oval
Imam
Issam al-Din Ibrahim Arbashah al-Asfrani
(Th 159 e)
Surah Al-Baqarah (verse 55-911)
In this investigative endeavor, a novel concrete variety incorporating sulfur-2,4-dinitrophenylhydrazine modification was developed, and its diverse attributes were explored. This innovative concrete was produced using sulfur-2,4-dinitrophenylhydrazine modification and an array of components. The newly created sulfur-2,4-dinitrophenylhydrazine modifier was synthesized. The surface texture resulting from this modifier was examined using SEM and EDS techniques. The component ratios within concrete, chemical and physical traits derived from the sulfur-2,4-dinitrophenylhydrazine modifier, chemical and corrosion resistance of concrete, concrete stability against water absorption, concrete resilience against freezing, physical and mechanical p
... Show More
XML is being incorporated into the foundation of E-business data applications. This paper addresses the problem of the freeform information that stored in any organization and how XML with using this new approach will make the operation of the search very efficient and time consuming. This paper introduces new solution and methodology that has been developed to capture and manage such unstructured freeform information (multi information) depending on the use of XML schema technologies, neural network idea and object oriented relational database, in order to provide a practical solution for efficiently management multi freeform information system.
The current research aims at transforming the concept of implication from the rhetoric into the industrial design in order to have a new term (the design implication) in which the industrial designer takes all or part of another's design to imply his design in it and acknowledge that, and if he did not do so, it would be (design theft) parallel to the literary plagiarism.
In order to show the potentials of the industrial design in the production of new formulations of the industrial products forms, as the design is the carrier of language that addresses the recipients, it is possible to use the implication as a the tool of literature in the design and as a design strategy as it is one of the concepts that takes its course in e
Recently, some prostate cancer patients have acquired resistance to the second -generation drugs (anzalutamide and apalutamide) prescribed for the treatment of this disease due to the emergence of the F876L mutation, which represents a challenge to modern medicine. In this study, a new series of 2-thiohydantoin derivatives were prepared through the reaction of different derivatives of maleimide (1c-4c) with isothiocyanate derivatives. The prepared compounds were diagnosed using FT-IR,1H-NMR ,13C-NMR, Mass spectra. The prepared series compounds has been studied against prostate cancer cells. The MTT assay was used to determine the activity of the prepared compounds against prostate cancer cells. The da
... Show MoreThis paper considers and proposes new estimators that depend on the sample and on prior information in the case that they either are equally or are not equally important in the model. The prior information is described as linear stochastic restrictions. We study the properties and the performances of these estimators compared to other common estimators using the mean squared error as a criterion for the goodness of fit. A numerical example and a simulation study are proposed to explain the performance of the estimators.
Art is a language in which the artist expresses himself, his society, and the events he lives in, so new artistic trends emerged, so the artist no longer practices his art as required by any previous artistic rules. And the thoughts wandering inside him, which led him to the abstract method in which the artist tries to employ the elements of the artwork in a plastic construction through which he achieves the relationships of the abstract form through the rhythms of lines, colors, spaces, shapes and textures without these plastic elements having any connection with the visual reality.
The research aims to find a new vision inspired by the school of geometric abstraction to enrich the field of Saudi plastic painting. And to take advan
The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreStrong and ∆-convergence for a two-step iteration process utilizing asymptotically nonexpansive and total asymptotically nonexpansive noneslf mappings in the CAT(0) spaces have been studied. As well, several strong convergence theorems under semi-compact and condition (M) have been proved. Our results improve and extend numerous familiar results from the existing literature.
The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show More