Preferred Language
Articles
/
jcois-1367
Contradiction oppositon al ruwia and al fatwa and his impact in different jurists in personal status and transactions and adomment
...Show More Authors

المقدمة

 الحمد لله رب العالمين، وأفضل السلام وأتم التسليم على سيدنا محمد، وعلى آله وصحبه، أجمعين، وعلى من تبعهم بإحسان إلى يوم الدين، أما بعد.

 فإن مسألة التعارض بين الرواية، والفتوى، من المسائل المشهورة عند الأصوليين والفقهاء،وهي من مباحث السنة عند الأصوليين، والتي تبنى عليها مسائل متعددة، وهي من أسباب اختلاف الفقهاء، فإذا ما روى أحد الرواة حديثاً معيناً، ثم عمل بخلاف ما روى، فللعلماء في ذلك خلاف، مبني على أن العبرة بروايته، إذ هو أدى ما روى، أو نقل ما حفظ، ثم بعد ذلك قد يعلم أن هذا الحديث الذي رواه، قد نسخ، أو ليس عليه العمل،أو ربما قد ينسى ما رواه،فيفتي باجتهاده،على خلاف ما رواه،أو أن فتياه ربما كانت قبل روايته،وهذه الأمور كلها مثار خلاف بين الأصوليين،لذلك، نشأ الخلاف المعروف،وهو:أن العبرة بما روى،أو بما عمل،ويبدو لي:أن المسائل التي يذكرها أهل الأصول تمثيلاً لهذه المسألة، قد تكون قليلة، ولكن،المتتبع لآراء الفقهاء،وكلامهم، وشراح الحديث وما أبدوه من توجيهات لهذه المسألة،يجد أكثر من ذلك،وقد استطعت بفضل الله تعالى أن أجمع اثنتي عشرة مسألة،تطبيقية،لهذه القاعدة الأصولية،الجليلة،ثم قمت ببحث المسائل الفقهية، بحثاً، مقارناً،غير مطول،لأن الغاية،هي إبراز مدى الترابط بين القاعدة الأصولية،وتطبيقاتها الفقهية.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Operations Rescheduling Strategies, Policies, and Methods: A Philosophic Approach
...Show More Authors

When scheduling rules become incapable to tackle the presence of a variety of unexpected disruptions frequently occurred in manufacturing systems,  it is necessary to develop a reactive schedule which can absorb the effects of such disruptions. Such responding requires efficient strategies, policies, and methods to controlling production & maintaining high shop performance. This can be achieved through rescheduling task which defined as an essential operating function to efficiently tackle and response to uncertainties and unexpected events. The framework proposed in this study consists of rescheduling approaches, strategies, policies, and techniques, which represents a guideline for most manufacturing companies operatin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Biochemical Cellular Archive
The relationship between helicobacter pylori infection and reproductive disorder
...Show More Authors

To determine the relationship between infertility and Helicobacter pylori infection, thirty-five infertile patients of ages (20-49) years have been investigated and compared with 10 apparently firtility individuals. All the studied groups were carried out to measure (ASA), (TNF-á), (IL-6), (anti-H.pylori IgA) and (anti-H.pyloriIgG) by Enzyme linked immunosorbent assay (ELISA) technique. The statistical analysis also demonstrated that there were a highly significant differences (P<0.01), when compared between studied group. Also, the statistical analysis demonstrated that there were a highly significant differences (P<0.01) when compare between infertility and fertility in Conc. of sperm. The percentage distribution of ASA in serum and seme

... Show More
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Gelatin Grafted Methyl Nadic Anhydride and Substitution With Salbutamol
...Show More Authors

Gelatin a promising biomaterial which is useful and interesting natural polymer which offer possibilities of chemical modification through grafted copolymerization with an saturated acid anhydride such as methyl nadic anhydride formatted gelatin –g- methyl nadic anhydride copolymer (A1), then modified to its corresponding polymer (A2) by substituted salbutamol as useful derivative as biomaterial .the prepared drug biopolymer was characterization by FTIR spectroscopy and thermal analysis was studied controlled drug release was measured in different buffer solution at 37C0 .

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 24 2016
Journal Name
Al-academy
Contemporary Sculpture vision and concept: محمد عبد الحسين يوسف
...Show More Authors

The research is divided into three chapters, the first of them to the research problem and its importance and its purpose and its limits, while the second chapter review of contemporary sculpture as a vision and concept, The third chapter came to view the most important results reached by the search.

 

View Publication Preview PDF
Crossref
Publication Date
Sat Jun 15 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proteoytic Activity and Swarming Growth of Proteus spp. Isolates.
...Show More Authors

Many clinical isolates of proteus spp. (30 isolates of P
mirabilis and 30 isolates of P. vulgaris) from patients with urinary
tract infections (UTIs) were examined for their ability to produce
proteolytic enzymes and their ability to form swarming growth. Most
(90%) of P. mirabilis and 60% of P. vulgaris isolates secreta
proteolytic enzymes. A strong correlation was found between the
ability of a strain to secreted proteases and it's ability to form
swarming growth. Non- swarming isolates invariably appeared to be
non- proteolytic. However, some isolates (12 isolates of P. vagaries)
were non- proteolytic even when they formed swarming growth

View Publication Preview PDF
Publication Date
Sat Oct 08 2022
Journal Name
Mathematical Statistician And Engineering Applications
Illation for the Groups SL(2,112 ) and SL(2,132 )
...Show More Authors

Publication Date
Thu Aug 03 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Category Theory and New Classes of Semi Bornological Group
...Show More Authors

Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Science International
USING CRYPTOANALYSIS POLICIES AND TECHNIQUES TO CREATE STRONG PASSWORD
...Show More Authors

Publication Date
Mon Jan 01 2018
Journal Name
Lamport
Cryptanalysis for Brute Force Attack and XOR Ciphering Methods
...Show More Authors