Every body has a size and mass that distinguishes it from others and makes it different from others. Some of these bodies are huge and large in size, and some are small and light in weight. Among these masses and bodies are some that are dealt with by their size and weight, each according to its quantity, weight, and cheapness. This is why they created quantities by which these weights and quantities could be estimated, so they used measures and weights for that. Objectives: The research aims to know some measures and weights, such as the wife’s maintenance, the amount of zakat, etc.I found it to be a widely spread topic, and widely used in the folds of jurisprudence. During my reading of jurisprudence books, I found jurists using many quantities, of multiple types, and different forms, according to the type of each quantity. methodology: I begin by mentioning the title and the definition in its language and terminology, and the basis of the issue from a verse or hadith, then I arrange the opinions, starting with the first, then the next, then the next, and I make the statement that seems to me closest to the truth - according to what I have arrived at - in the last. I have attributed the Qur’anic verses to their surahs, and the noble hadiths to their original sources as much as I can. If I do not find it, I indicate the place from which I took it. Results: Conclusion: Jurisprudential theories are a new method of writing, and a new method of classification, created by contemporary scholars. They composed several theories, with multiple topics, according to each theory and its details. The theory of magnitude is a theory that includes the origins of the particulars of quantities, in its spread within the various sections of jurisprudence.
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreSubstantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovat
... Show MoreAbstract The aim of this paper is to shed light on the theme of Gender Struggle and Women’s Predicament in Tennessee Williams’ A Street Car Named Desire .The paper tries to show William's dealings with the critical social themes like Men's Brutality and women's predicament. The paper exposes the complete shift of the balance of power between the genders in America after the two world wars. Williams illustrates society’s changing attitudes towards masculinity and denounces the society's attitudes towards women in America at that time. He rebels against the cruelty of the modern age and regrets the disintegration of the values of the south and their being replaced by the disruptive forces of modern life. In the end of the play, brutalit
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreRecently, women's rape has been a pervasive problem in the Iraqi society. Thus, it has become necessary to consider the role of language and its influence on the common beliefs and opinions about rape in the Iraqi society. Thus, taking into consideration the critical role of language and its impact on the perception of human reality and the social development based on people's beliefs and principles of life has become highly indispensable. Therefore. The aim of this article is to address this problem critically from legislation and social norms in NGOs' reports (2015; 2019) with reference to some provisions from the Iraqi Panel Code (1969; 2010). Therefore, the researchers examine the discursive strategies and ideological viewpoints in t
... Show MoreThis research aims to know the reality of implementation of Knowledge Management in Saudi Universities Applied in Shaqra University and to study the difficults whish encountered in applying the Knowledge Management approach.
The study investigated the university staff in Shaqra, Thadig, and Huraymila branches, using a questionnaire designed by the researcher to collect the data, sample of (260) members was used, applying the descriptive analytical approach to test the hypothesis by using (SPSS) program.
The study revealed that the first four zero hypothesis are rejected because there is medium approval of the university members on the fo
... Show MoreAbstract
The open budget means everyone in the society can get information about the government budget in order to watch the governmental works. The aim of the research is to study the concepts of open budget, its advantage, limitations, role of supporting the transparency and questioning the administrative and financial corruption. Thus reflects positively on the national economy by providing governmental information to all users whether they are individuals or belong to the political class, or any other governmental or nongovernmental organizations which are interested in these information.
In order to achieve the objectives of the research aims, we make questionnaire to see aca
... Show More