Preferred Language
Articles
/
jcois-1367
Contradiction oppositon al ruwia and al fatwa and his impact in different jurists in personal status and transactions and adomment
...Show More Authors

المقدمة

 الحمد لله رب العالمين، وأفضل السلام وأتم التسليم على سيدنا محمد، وعلى آله وصحبه، أجمعين، وعلى من تبعهم بإحسان إلى يوم الدين، أما بعد.

 فإن مسألة التعارض بين الرواية، والفتوى، من المسائل المشهورة عند الأصوليين والفقهاء،وهي من مباحث السنة عند الأصوليين، والتي تبنى عليها مسائل متعددة، وهي من أسباب اختلاف الفقهاء، فإذا ما روى أحد الرواة حديثاً معيناً، ثم عمل بخلاف ما روى، فللعلماء في ذلك خلاف، مبني على أن العبرة بروايته، إذ هو أدى ما روى، أو نقل ما حفظ، ثم بعد ذلك قد يعلم أن هذا الحديث الذي رواه، قد نسخ، أو ليس عليه العمل،أو ربما قد ينسى ما رواه،فيفتي باجتهاده،على خلاف ما رواه،أو أن فتياه ربما كانت قبل روايته،وهذه الأمور كلها مثار خلاف بين الأصوليين،لذلك، نشأ الخلاف المعروف،وهو:أن العبرة بما روى،أو بما عمل،ويبدو لي:أن المسائل التي يذكرها أهل الأصول تمثيلاً لهذه المسألة، قد تكون قليلة، ولكن،المتتبع لآراء الفقهاء،وكلامهم، وشراح الحديث وما أبدوه من توجيهات لهذه المسألة،يجد أكثر من ذلك،وقد استطعت بفضل الله تعالى أن أجمع اثنتي عشرة مسألة،تطبيقية،لهذه القاعدة الأصولية،الجليلة،ثم قمت ببحث المسائل الفقهية، بحثاً، مقارناً،غير مطول،لأن الغاية،هي إبراز مدى الترابط بين القاعدة الأصولية،وتطبيقاتها الفقهية.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2013
Journal Name
University Of Thiqar Journal
Problems of Translating Cultural Signs with Reference to English and Arabic
...Show More Authors

Publication Date
Fri May 01 2015
Journal Name
2015 Ieee Congress On Evolutionary Computation (cec)
Differential evolution with adaptive repository of strategies and parameter control schemes
...Show More Authors

A new Differential Evolution (ARDE) algorithm is introduced that automatically adapt a repository of DE strategies and parameters adaptation schemes of the mutation factor and the crossover rate to avoid the problems of stagnation and make DE responds to a wide range of function characteristics at different stages of the evolution. ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. Then a new adaptive procedure called adaptive repository (AR) has been developed to select the appropriate combinations of the JADE strategies and the parameter control schemes of the MDE_pBX to generate the next population based on their fitness values. Experimental results have been presented to confirm the reli

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Integrated Approach for Management OF Supply chain and relationship with MRP
...Show More Authors

 

Find interested in the harmonization of variables and determinants of supply chain planning needs of the material, leading to the results start effective supply chain management, and end up quickly modify the sizes to suit the demand and turnover in the market. As well as identifying relationships between variables, and type of relationship used by the company with the processors and their feasibility, and indicate the level of interest and willingness to redesign the supply chain Company for Electrical Industries and build an integrated model for supply chain with the MRP system can be applied in the company.

Research depend on quantitative and descriptive method, It

... Show More
View Publication
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
Color Image Denoising Using Stationary Wavelet Transform and Adaptive Wiener Filter
...Show More Authors

The denoising of a natural image corrupted by Gaussian noise is a problem in signal or image processing.  Much work has been done in the field of wavelet thresholding but most of it was focused on statistical modeling of wavelet coefficients and the optimal choice of thresholds.  This paper describes a new method for the suppression of noise in image by fusing the stationary wavelet denoising technique with adaptive wiener filter. The wiener filter is applied to the reconstructed image for the approximation coefficients only, while the thresholding technique is applied to the details coefficients of the transform, then get the final denoised image is obtained by combining the two results. The proposed method was applied by usin

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (23)
Crossref (12)
Scopus Crossref
Publication Date
Thu Apr 29 2021
Journal Name
Iraqi Journal Of Science
Capacitance and Resistivity Measurements of Polythiophene /Metallic Nanoparticles-based Humidity Sensors
...Show More Authors

Capacitive–resistive humidity sensors based on polythiophene (P3HT) organic semiconductor as an active material hybrid with three types of metallic nanoparticles (NP) (Ag, Al, and Cu) were synthesized by pulsed laser ablation (PLA). The hybrid P3HT/metallic nanoparticles were deposited on indium-tin-oxide (ITO) substrate at room temperature. The surface morphology of theses samples was studied by using field emission scanning electron micrographs (FE-SEM), which indicated the formation of nanoparticles with grain size of about 50nm. The electrical characteristics of the sensors were examined as a function of the relative humidity levels. The sensors showed an increase in the capacitance with variation in the humidity level.  Whil

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (6)
Scopus Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Journal Of Engineering
Mechanical and Physiochemical Properties of Central Marshes Bed Soils – Southern Iraq
...Show More Authors

The central marshes are one of the most important wetlands/ecosystems in the southern area of Iraq. This study evaluates the bed soil's mechanical, physical, and chemical properties at certain southern Iraqi central marshes sites. This was conducted to investigate their types and suitability for enhancing the agricultural reality of most field crops and for construction purposes. Soil samples were collected from 15 sites at 10-100 cm depth. Hence, numerous parameters were determined: index properties, unconfined compressive strength, direct shear strength, consolidation, texture, and sieve analysis, water content, specific gravity, dry density, permeability, pH, total soluble salts (TSS), organic materials (OM) and total sulfate con

... Show More
View Publication
Crossref
Publication Date
Sat Feb 14 2026
Journal Name
Al–bahith Al–a'alami
Organizational reputation: A descriptive study of concept development and measurement techniques
...Show More Authors

The study aimed to monitor the concept of reputation in the previous literature, its relationship to mental image and identity, and to reveal recent trends in its measurement Techniques.

    The study relied on a descriptive approach using library survey and comparative analysis, and the study reached following conclusions:

     Despite the beginning of the first signs of reputation In the fifties of the last century, however, Defining and standardizing the concept with clear and specific dimensions began in the 1990s and the beginning of the third millennium. The concept of reputation refers to the stakeholders’ overall evaluation of organizations, which reflects their perceptions of

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Effect of growth regulators on sex expression and some quantitatve properties
...Show More Authors

This study was conducted in an orchard pomegranate's Department of Horticulture College of Agriculture, University of Baghdad for two seasons 1999-2000 on cultivars pomegranate Salimi and narrators seedless to study the effect spraying Nizant growth in sex ratio of flowers and recipes flowering and winning was selected 27 trees per class 15 years old planted

View Publication Preview PDF
Crossref