As we have said that the reasons for abortion are many and varied them to be for
the purpose of treatment or the protection of the mother of the loss or that the abortion
of an act intended purpose of birth control or other reasons is the statistics that are
spread in the world that about 50-60 million abortions annually in the world If this
abortion criminal who is loss of the lives of fetuses and a disgrace to the preachers to
the progressive and liberal, secular, and because they were not able to maintain
human life after leaving the obligation to approach Islam and because life support is
the highest things, which is one of the necessities of the five obligatory street
maintenance came verses warn those who underestimate the death of the verse: (And
whoever kills a believer intentionally, his recompense is Hell to abide therein and the
wrath of God upon him, and prepared for him a great punishment) Women: 93.
Therefore, it has been reached to the most important objectives of the research
are:First: the whole jurists on the sanctity of abortion after the soul is breathed into the
fetus Wang is killed for the same as abortion after the soul is breathed into the loss of
spirit and the destruction of the body is killed for the same as the loss of the spirit of
killing is achieved up taking the soul, and spirit have been resolved the body after the
fourth month The attack by the loss of those Spirit embryo after entering the stage of
the soul is breathed is permissible to describe humans and worthy of respect, which
bestowed on the son of Adam on the right of life, and an estimated four months after
pregnancy on the basis of the Hadith from Ibn Masood may Allah be pleased with
him narrated that the Messenger of Allah peace be upon him, a sincere and
trustworthy: ( that combines one of you created in the womb for forty days, then the
sperm will be such a leech and then the embryo such as that and then breathed into
him).
Second: we say that the origin of abortion is a risk, but some scholars say it is
permissible to abort a pregnancy before the soul has been breathed before four months
of pregnancy for a reason acceptable to drop Kalmarbp chronic illness or Kalmrdap if
hit by the rope and cut off the milk and not to Abu small pregnancy what rent by Zir
any nursing and afraid of loss of the child and clear from this that abortion before the
lapse of four months of pregnancy to the imperatives of miscarriage treatment is a
legitimate reason.
Third: If the breed of the human community which is urged by the Holy Prophet
peace be upon him said: (I am married loving and fertile Propagated you prophets, the
Day of Resurrection). Abortion is to minimize the illiterate and weakening of the very
least, the incidence of abortion up to about 50-60 million abortions a year and more
than half of these cases occur in developing countries is it possible to say that it is
permissible abortion of millions of embryos and pieces of life for them to desire a
casual or lust hidden.
Fourth: the legal rules established to ward off evil takes precedence over
bringing benefits has proven good that abortion was a major women's health and has
influences serious organ towns where Dr. Frederick Tasc: that the pregnancy when it comes out before completion, there are three damage against birth control human for
him: A. Destroy an unknown number of human will to get out before the light of life.
B. Go number fraction of maternal death during a victim of the abortion process.
C. Occur in women effects satisfactory significant number.
Fifth: that a pregnant woman if the limit does not deserved to be held only after
take pregnancy The suspension is the extent that the rule of God in order to rule on
the inadmissibility of evidence to abort the pregnancy if it was permissible to
permissible here a fortiori.
And weighting that which seems to me is that it is not permissible to abortion
and the sanctity of abort a pregnancy at any stage of Otourah because all of the
embryo in which a decent life is the life of growth and numbers in contrast to those
who they endorse before the soul is breathed into doing so, they open the door
difficult to close and put in the hands of enemies of Islam and its enemies a weapon
stab tags Islam and justify it as being in non-Muslim country of scandals and
antipathic shook the church and the clergy, so that we have already mentioned we
believe that the prevailing view is the view that the sanctity of the projection at all
stages and that which went to most of the Maalikis and some Shafi'i and Hanafi and
forward and shared their belief in God, I know.
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreSM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreIn this paper we define and study new concepts of fibrewise topological spaces over B namely, fibrewise Lindelöf and locally Lindelöf topological spaces, which are generalizations of will-known concepts: Lindelöf topological space (1) "A topological space X is called a Lindelöf space if for every open cover of X has a countable subcover" and locally Lindelöf topological space (1) "A topological space X is called a locally Lindelöf space if for every point x in X, there exist a nbd U of x such that the closure of U in X is Lindelöf space". Either the new concepts are: "A fibrewise topological space X over B is called a fibrewise Lindelöf if the projection function p : X→B is Lindelöf" and "The fibrewise topological space X over B
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
This work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).
Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors. The RNG k-ε model of turbulence is used to determining the accurate results from CFD.
The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThis paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft
... Show MoreExperimental and numerical investigations of the centrifugal pump performance at non-cavitating and cavitating flow conditions were carried out in the present study. Experiments were performed by applying a vacuum to a closed-loop system to investigate the effects of the net positive suction head available (NPSHa), flow rate, water temperature and pump speed on the centrifugal pump performance. Accordingly, many of the important parameters concerning cavitation phenomenon were calculated. Also, the noise which is accompanied by cavitation was measured. Numerical analysis was implemented for two phase flow (the water and its vapor) using a 2-D simulation by ANSYS FLUENT software to investigate the internal flow of centrifugal pump under c
... Show More