The research was titled: Approval of the Imam of the Nuclear of Iraqis through the curriculum of the students.
The research revolves around the study of the weight of the imam nuclear jurisprudence in which the views of the Iraqi jurists of the Imam Shafi'i agreed through the book of students' approach to the nuclear imam, the research included a brief translation of the nuclear imam, and the definition of his place in the Shafi'i school, and then the definition of Iraqi jurists and then study the jurisprudence The course of research is only three issues, and compared with the views of imams, and the statement of the most correct opinion, and God and the conciliator.
researcher
A restrictive relative clause (RRC hereafter), which is also known as a defining relative clause, gives essential information about a noun that comes before it: without this clause the sentence wouldn’t make much sense. A RRC can be introduced by that, which, whose, who, or whom. Givon (1993, 1995), Fox (1987), Fox and Thompson (1990) state that a RCC is used for two main functions: grounding and description. When a RRC serves the function of linking the current referent to the preceding utterance in the discourse, it does a grounding function; and when the information coded in a RRC is associated with the prior proposition frame, the RRC does a proposition-linking grounding function. Furthermore, when a RRC is not used to ground a new di
... Show MoreThe research attempts to identify the pattern of punctuation in contemporary Iraqi poetry through delving into the poetry of an Iraqi poet belonging to the seventieth generation, Namik Abdul Deeb, who belongs to the poets of Arab modernity in general, the research has reached many results, including that the signs of deletion were vocabulary marks any They are located in the center of the poetic singular, or inline markers, which are those that fall within the poetic line of the prose poem separating its vocabulary, or cross-sectional marks located within the poetic passages that are part of the poetic text, and finally text marks which are located within the poetic text and fragmented into Parts. The research also found that the work of
... Show MoreThe aim of this research was to evaluate the level of ball control in basketball. There was a great weakness in ball control that affected the mastery of many skills that affect the success of the team. The researcher also found a lack in training programs concerning ball control. The researchers used (9) special tests for ball control out of (41) test applied on young basketball players were (86). The researchers concluded that: 1. Criteria were set for test results of ball control. 2. A level of criteria was set for test results of ball control.
Risk factors can be considered unique in construction projects, especially in tendering phase. This research is directed to recognize and evaluate the importance of critical risk factors in the tendering phase related to Iraq’s construction project. As a rule, construction projects are impacted by risk factors throughout the project life cycle; without identifying and allocating these risk factors, the project cannot succeed. In this paper, the open and closed questionnaires are used to categorize the critical risk factors in tendering phase. Research aims to recognize the factors that influence the success of tendering phase, to determine the correct response to the risk’s factors in this research article, (IBM, SPSS, V23) package has
... Show MoreThe current research studies (representations of metaphysics in the works of potter Jason Walker) a concept that refers to To a large extent, by conveying a sense of reality to the recipient by conveying ideas, contents, and connotations. A variety of center hit, dispersion, and rejection of everything that prevails, so our position on the closed text has shifted To the open text, through the role played by cross-pollination in the works of the potter (Jason Walker), which established a clear hypothetical vision of the image represented in the construction of the ceramic work and the thought that was embodied in that image represented by the nature of its unrealistic formations for those ceramic artworks. It is thus considered a logical
... Show MoreThe study of criminal danger is a part of a common phenomenon in criminal studies, namely, the conflict between traditional legal concepts and the new requirements of modern criminal policy, and the primacy of development and response to the requirements of modern human life. Criminal law scholars have recognized the importance of danger, especially after they have determined that the danger of crime is not limited to material damage, but rather to aggression against fundamental interests of the group, which is the possibility of damage. In particular, development and progress have led to the emergence of new areas in which the danger is the basis of the criminalization of related acts such as security, economy, trade, modern industries,
... Show MoreThe major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech
... Show More