DBNRAAK Mohammed, International Journal of Research in Social Sciences and Humanities, 2020
There is talk of the Prophet ﷺ proud of his relative, which is the uncle, and the importance of this subject, this search for doctrinal matters related to the two things between us: the interest of the Prophet ﷺ responsible, and also responsible forbidden marriage and marriage as it is forbidden to marry the uncle, and in the uncle language: mother's brother, aunt Her uncle may spend his uncle's nephew, the uncle may embrace his nephew, the uncle shall be the guardian of the little or the small, not to cut off the uncle if he steals from his nephew's money. "
Most of the mosques in the Islamic world fall under specific and known forms and patterns to a large extent, and such patterns have grown and evolved from the few basic and uniform models, but they changed slowly due to the impact with a mixture of changing functional requirements and cultural landscapes because of the variables of time and place to form patterns known and famous in this day across parts of the Islamic world and its borders. There was no exception to these patterns, but small numbers of mosques that were probably the result of personal experiences or improvisational resolutions, or in response to specific or temporary stimuli. However, the emergence of a specific pattern which does not belong to any of these patt
... Show MoreThe research in Islamic history is considered a title for the glory of the nation and a mirror for the intellectual and mental maturity of the men of the Islamic state who played an important role in saving humanity from darkness to light and from ignorance to knowledge and to show their position in building the Islamic state, and to highlight the importance of their conquests of neighboring cities and the expansion of Islam, and for this reason they appear The importance of writing on the topic (The Battle of Dumat al-Jandal and its impact on the era of the Prophethood and the Rightly Guided Caliphate). The reason for choosing this topic was to show the status of Dumat al-Jandal and its importance in the Islamic state and its great role
... Show MoreIn order to get advanced results, we must stand at the pointsthat have been observed by the trainers that are of significance inthe sport of fencing and concern for capacity optical (traceoptical and precision visual animation), so we must learn some ofthese types of capacity, whichever is more influential in the gamefencing so that they add a new axis to the player to pick andchoose in order to achieve the desired goal and raise the level ofthe game.The study aimed to identify the relationship between the visualtracking and accuracy of visual animated face and the results ofcompetitions Sabre of the other.Used a much more descriptive approach to study relational on asample of players clubs Sabre and the way intentional, whoqualified to the
... Show Moreالخلاصة لقد شكل المحافظون الجدد وهم بالأساس نخبة من المثقفين ومن السياسيين الأمريكيين كتلة ضغط كبيرة التأثير على الإدارة في عهد الجمهوريين. حمل هؤلاء المحافظون مشروعاً إيديولوجياً البسوه لسلطة الجمهوريين وهو يهدف إلى جعل أمريكا سيدة العالم من دون منازع خاصة بعد انهيار الاتحاد السوفييتي ونهاية الحرب الباردة. واكب هذا الحدث التاريخي الكثير من الأفكار ومنها (نهاية التاريخ)، وصراع الحضارات، وكذ
... Show MoreThe media: ((Providing people with the right news, audio information, and constant facts that help them form a correct opinion in an incident or a problem, this opinion gives an objective expression of the mentality of the audience, their trends and tendencies). The German scientist Autogroot defines it as "the objective expression of the mentality of the audience, their spirit, their tendencies, and their trends at the same time." Whereas for "Aristotle", (Language) is a specific verbal system created as a result of an agreement between the members of the human group somewhere )). It is a symbol of thought, and a difference between humans and animals. Pronunciation and thought for “Aristotle” are intertwined: without pro
... Show MoreAfter more than ten years of successful march of the European single currency and EU countries faced a crisis in one of its debt, which recently joined the monetary union is not Greece . Perhaps mpre than th effects of this crisis, the fact that its consequences were not confined to Greece alone , but expand it to include all EU countries in general and the countries of the European Monetary Union in particular.
Sine the debt crisis that emerged Greek and talk a lot a bout their effects on the global economy and the potential harm done th the situation of the global economy recovers from the global financial crisis (mortgage crisis), or delayed and also the fears of other crises to other member states suf
... Show MoreSystems on Chips (SoCs) architecture complexity is result of integrating a large numbers of cores in a single chip. The approaches should address the systems particular challenges such as reliability, performance, and power constraints. Monitoring became a necessary part for testing, debugging and performance evaluations of SoCs at run time, as On-chip monitoring is employed to provide environmental information, such as temperature, voltage, and error data. Real-time system validation is done by exploiting the monitoring to determine the proper operation of a system within the designed parameters. The paper explains the common monitoring operations in SoCs, showing the functionality of thermal, voltage and soft error monitors. The different
... Show MoreThe aim of this paper is to study the Zariski topology of a commutative KU-algebra. Firstly, we introduce new concepts of a KU-algebra, such as KU-lattice, involutory ideal and prime ideal and investigate some basic properties of these concepts. Secondly, the notion of the topology spectrum of a commutative KU-algebra is studied and several properties of this topology are provided. Also, we study the continuous map of this topological space.
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.