Preferred Language
Articles
/
jcois-1367
Contradiction oppositon al ruwia and al fatwa and his impact in different jurists in personal status and transactions and adomment
...Show More Authors

المقدمة

 الحمد لله رب العالمين، وأفضل السلام وأتم التسليم على سيدنا محمد، وعلى آله وصحبه، أجمعين، وعلى من تبعهم بإحسان إلى يوم الدين، أما بعد.

 فإن مسألة التعارض بين الرواية، والفتوى، من المسائل المشهورة عند الأصوليين والفقهاء،وهي من مباحث السنة عند الأصوليين، والتي تبنى عليها مسائل متعددة، وهي من أسباب اختلاف الفقهاء، فإذا ما روى أحد الرواة حديثاً معيناً، ثم عمل بخلاف ما روى، فللعلماء في ذلك خلاف، مبني على أن العبرة بروايته، إذ هو أدى ما روى، أو نقل ما حفظ، ثم بعد ذلك قد يعلم أن هذا الحديث الذي رواه، قد نسخ، أو ليس عليه العمل،أو ربما قد ينسى ما رواه،فيفتي باجتهاده،على خلاف ما رواه،أو أن فتياه ربما كانت قبل روايته،وهذه الأمور كلها مثار خلاف بين الأصوليين،لذلك، نشأ الخلاف المعروف،وهو:أن العبرة بما روى،أو بما عمل،ويبدو لي:أن المسائل التي يذكرها أهل الأصول تمثيلاً لهذه المسألة، قد تكون قليلة، ولكن،المتتبع لآراء الفقهاء،وكلامهم، وشراح الحديث وما أبدوه من توجيهات لهذه المسألة،يجد أكثر من ذلك،وقد استطعت بفضل الله تعالى أن أجمع اثنتي عشرة مسألة،تطبيقية،لهذه القاعدة الأصولية،الجليلة،ثم قمت ببحث المسائل الفقهية، بحثاً، مقارناً،غير مطول،لأن الغاية،هي إبراز مدى الترابط بين القاعدة الأصولية،وتطبيقاتها الفقهية.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Journal Of Engineering
Modeling and Simulating NOMA Performance for Next Generations
...Show More Authors

Non-orthogonal Multiple Access (NOMA) is a multiple-access technique allowing multiusers to share the same communication resources, increasing spectral efficiency and throughput. NOMA has been shown to provide significant performance gains over orthogonal multiple access (OMA) regarding spectral efficiency and throughput. In this paper, two scenarios of NOMA are analyzed and simulated, involving two users and multiple users (four users) to evaluate NOMA's performance. The simulated results indicate that the achievable sum rate for the two users’ scenarios is 16.7 (bps/Hz), while for the multi-users scenario is 20.69 (bps/Hz) at transmitted power of 25 dBm. The BER for two users’ scenarios is 0.004202 and 0.001564 for

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Iraq and Rockffler Institution for Charity 1929 – 1944
...Show More Authors

The thirties and the early forties and the at end of the World War II of the last century
witnessed several attempts carried out by the Public Health Directorate and by the Iraqi
Ministry of Foreign Affairs to persuade the Rockefeller Foundation to fund Iraq with its
health program which is carried out in several regions in the world to promote the health and
social situations since Iraq during that period in history was badly in need to such plans and
programs because of this lack of financial and technical possibilities necessary for the
advancement of health and social dire situation.
The details of these attempts are deposited in the documents of the diplomatic mail
records of the United States of America , an

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Petroleum Science And Engineering
Top lean zone and cardinal parameters affecting SAGD
...Show More Authors

SAGD is a thermal recovery process in which steam oil ratio, SOR, is a key parameter that can affect the economic outcome of the process. Reservoirs with underlying or overlying lean bitumen present challenges for SAGD as they can act as a heat sink. Water has higher heat capacity than the bitumen and thus requires more steam to heat up the reservoir leading to higher SOR. The potential outcome of operating SAGD in these conditions may be lower bitumen rate and higher steam injection rate, both of which affect plant throughput and thus the economic matrix of SAGD. This paper looks at the performance of SAGD process in the presence of top lean bitumen. It will examine the theoretical CSOR that is needed to produce the bitumen with different

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sat Sep 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Governance work guidance for financial and institutional reform
...Show More Authors

There has been increase in banks and financial institutions interest in governance topic, as it focused all it attention on this topic specially after the growing role and massive expansion of the private sector in economic life , this sector become vital and important and basic role in growth and developing countries economy that’s why there been increase interest in governance and its mechanism , using this mechanism ( board of directors mechanism , ownership concentration mechanism , financial compensation mechanism, minimum rate of capital mechanism) who would adjust and guide the path and orientation of banks and financial institutions as to ensure the  achievement of their goals and mission of their desired within th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2008
Journal Name
Baghdad Science Journal
Microbiological Examination of some ImportedCanned and Frozen Foods
...Show More Authors

A number of juices, jams, canned foods and frozen fishes available in local markets were inspected with respect to microbial contamination. We have determined the total viable bacterial cell counts in these samples and the number of g(-) lactose fermentors as a bacterial indicator of food spoilage. The results indicated that most of the food items inspected, were contaminated with large numbers of different species of g(-) ,g(+), yeast and fungi and some were contained more than the maximum permissible number of pathogenic g(-) enteric E-coli, which render these food items unsafe for human consumption.

View Publication Preview PDF
Crossref
Publication Date
Fri Jun 18 2004
Journal Name
Iraqi Journal Of Laser
Quantum Cryptography and a Quantum Key Distribution Protocol
...Show More Authors

In this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.

View Publication Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
2019 International Conference On Electrical Engineering And Informatics (iceei)
Health Information Exchange: Current Trends, Challenges and Recommendations
...Show More Authors

View Publication
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Effective Rules for Building and Securing of Blogs
...Show More Authors

Blogging is about more than just putting thoughts on a web; it's about connecting with and hearing from anyone who read the work. Many web sites now days help to get a free account to quick post thoughts and photos interact with people, and more. The fastest way to understand blogging is to try it out, but in that case securing the blog is important, by including authentication schemes. In this paper we suggest implications of our research for improving the design and usefulness of blogging systems, and also we divided the blogs depending on the subject and need, which are either to be used in public or only used by small group, so we can suggest different steps for securing the blogs.

View Publication Preview PDF
Crossref
Publication Date
Sun Sep 29 2019
Journal Name
Annals Of Tropical Medicine And Public Health
Histopathological study of hepatic and pulmonary sheep's hydatidosis
...Show More Authors

View Publication