Preferred Language
Articles
/
jcois-1367
Contradiction oppositon al ruwia and al fatwa and his impact in different jurists in personal status and transactions and adomment
...Show More Authors

المقدمة

 الحمد لله رب العالمين، وأفضل السلام وأتم التسليم على سيدنا محمد، وعلى آله وصحبه، أجمعين، وعلى من تبعهم بإحسان إلى يوم الدين، أما بعد.

 فإن مسألة التعارض بين الرواية، والفتوى، من المسائل المشهورة عند الأصوليين والفقهاء،وهي من مباحث السنة عند الأصوليين، والتي تبنى عليها مسائل متعددة، وهي من أسباب اختلاف الفقهاء، فإذا ما روى أحد الرواة حديثاً معيناً، ثم عمل بخلاف ما روى، فللعلماء في ذلك خلاف، مبني على أن العبرة بروايته، إذ هو أدى ما روى، أو نقل ما حفظ، ثم بعد ذلك قد يعلم أن هذا الحديث الذي رواه، قد نسخ، أو ليس عليه العمل،أو ربما قد ينسى ما رواه،فيفتي باجتهاده،على خلاف ما رواه،أو أن فتياه ربما كانت قبل روايته،وهذه الأمور كلها مثار خلاف بين الأصوليين،لذلك، نشأ الخلاف المعروف،وهو:أن العبرة بما روى،أو بما عمل،ويبدو لي:أن المسائل التي يذكرها أهل الأصول تمثيلاً لهذه المسألة، قد تكون قليلة، ولكن،المتتبع لآراء الفقهاء،وكلامهم، وشراح الحديث وما أبدوه من توجيهات لهذه المسألة،يجد أكثر من ذلك،وقد استطعت بفضل الله تعالى أن أجمع اثنتي عشرة مسألة،تطبيقية،لهذه القاعدة الأصولية،الجليلة،ثم قمت ببحث المسائل الفقهية، بحثاً، مقارناً،غير مطول،لأن الغاية،هي إبراز مدى الترابط بين القاعدة الأصولية،وتطبيقاتها الفقهية.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Stability constants of iron(II) supported and lead(II) complexes
...Show More Authors

Overall enthalpy and entropy of complex formation were calculated from stability constant measurements at different tempreture also experimental results

View Publication Preview PDF
Publication Date
Wed Dec 11 2019
Journal Name
Journal Of The College Of Education For Women
Evaluation of Raw and Drinking Water for Diyala Governorate (2017)
...Show More Authors

The study examined the assessment of raw water and drinking water projects of  Diyala Governorate for the year 2017, amounting to (24) projects, The average per capita supply of potable water (0.396 m3 / day/person), which is less than the global standard for the average per capita of drinking water, and constitute water rumors within the network of water transport in the province (3%), and the water of raw and drinking value within the limits allowed to be used by Iraq and the global indicators of {Total acidity, alkaline, acidic function, chlorides, magnesium, Electrical conductivity, total soluble salts, sodium, potassium, sulfates, turbidity other than (raw water)}. While the index of calcium only a value higher than the limits

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Notes on estimation of ARMA model (1.1) And ARMA (0,1)
...Show More Authors

By driven the moment estimator of ARMA (1, 1) and by using the simulation some important notice are founded, From the more notice conclusions that the relation between the sign   and moment estimator for ARMA (1, 1) model that is: when the sign is positive means the root      gives invertible model and when the sign is negative means the root      gives invertible model. An alternative method has been suggested for ARMA (0, 1) model can be suitable when

View Publication Preview PDF
Crossref
Publication Date
Fri Sep 16 2022
Journal Name
Methods In Molecular Biology
Fluorescent Proteins: Crystallization, Structural Determination, and Nonnatural Amino Acid Incorporation
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref
Publication Date
Thu May 30 2024
Journal Name
Iraqi Journal Of Science
Lipid Profile Parameters and Adipokines among Adolescents Infected with Toxoplasmosis
...Show More Authors

The lipid profile and adipokines of an adolescent may be affected by some parasite infections. Recently, it has been discovered that these parasites are connected to body mass index (BMI), lipids and adipokines. The current study, therefore, aimed to specify how Toxoplasma gondii (T. gondii) affect BMI, lipid profile and adipokines. This study was conducted in Al Madain hospital, Baghdad from October to December 2022. An ELISA test was performed to examine the anti-T. gondii IgG and IgM for a group of adolescents attending the hospital. Based on this examination ninety adolescents were chosen to be involved in the study. They were separated in to two groups: individuals who tested positive for the parasite (n=45) and those who teste

... Show More
Scopus (1)
Scopus Crossref
Publication Date
Sun Dec 29 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Kinetics and Thermodynamics of Peppermint Oil Extraction from Peppermint Leaves
...Show More Authors

This study aimed to extraction of essential oil from peppermint leaves by using hydro distillation methods. In the peppermint oil extraction with hydro distillation method is studied the effect of the extraction temperature to the yield of peppermint oil. Besides it also studied the kinetics during the extraction process. Then, 2nd -order mechanism was adopted in the model of hydro distillation for estimation many parameters such as the initial extraction rate, capacity of extraction and the constant rat of extraction with various temperature. The same model was also used to estimate the activation energy. The results showed a spontaneous process, since the  Gibbs free energy had a value negative sign.

View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of The College Of Languages (jcl)
A Stylistic Study of English Aphorisms of “Life and Death”
...Show More Authors

In this paper , some of lexical stylistic , syntactical stylistic  devices , and one phonetic stylistic device are going to be illustrated in the study of the aphorisms of “life and death” . These stylistic  devices are parallelism , hyperbole , alliteration , meiosis , irony , oxymoron , cliché , litotes , metalepsis , and loose sentences.  This paper aims at identifying the functions and the  frequencies of these devices. These stylistic devices make one speech and writing more interesting and help to get the attention of readers/ listeners

View Publication Preview PDF
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Modeling and Control of Fuel Cell Using Artificial Neural Networks
...Show More Authors

This paper includes an experimental study of hydrogen mass flow rate and inlet hydrogen pressure effect on the fuel cell performance. Depending on the experimental results, a model of fuel cell based on artificial neural networks is proposed. A back propagation learning rule with the log-sigmoid activation function is adopted to construct neural networks model. Experimental data resulting from 36 fuel cell tests are used as a learning data. The hydrogen mass flow rate, applied load and inlet hydrogen pressure are inputs to fuel cell model, while the current and voltage are outputs. Proposed model could successfully predict the fuel cell performance in good agreement with actual data. This work is extended to developed fuel cell feedback

... Show More
View Publication Preview PDF