Preferred Language
Articles
/
jcois-1867
Controls Scanning on the slippers: a study fiqhiat Comparison
...Show More Authors

 

 

Controls Scanning on the slippers a study fiqhiat Comparison

The subject of this research is an important topic, which is frequently repeated, and people need to know its wisdom, and has made it in front and the preface and three detectives, showed through discussion the meaning of the survey on the socks, its wisdom, its rules and conditions, and the duration of the survey on it, spoiled and reasoned and compared to the doctrinal doctrines, And the most correct statement of words I have concluded with a number of things, as follows:

  1. The need to ensure that the slippers are clean, visible and inwardly, because the socks are flushed instead of washing the man and must be purified
  2. The survey should be about a smaller event, because it is repeated, and in the removal of the socks with embarrassment and hardship, other than Janaabah, its existence is not more serious and embarrassing.
  3. The slippers should be thick, true, unhidden, can usually be walked, prevent the influence of water into the body, and be exempted from easy
  4. When the conditions and controls in the slippers are met, they may be surveyed, although not made of leather.
  5. The fact that the slippers are legally owned by the wearer does not preclude the correct scanning.
  6. The timing of the survey on the socks day and night for the resident and three days for the traveller, long enough, to wear slippers and take off
  7. Focus on issues that concern people and need to know their governance, which is called for, and is urged by Sharia law.
  8. To show what is characteristic of our Islamic sharia, to ease, facilitate and raise the embarrassment, and facilitate the issues of fiqh, and offer them in an easy way, and a smooth way

 

 

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 31 2016
Journal Name
مجلة جامعة االنبار للعلوم البدنية والرياضية
The effects of Pilates exercises while using the ladder barrel device on fitness and coordinatedin performance for motor formations in artistic gymnastics for students
...Show More Authors

The aim of the research was to prepare Pilates exercises using the barrel ladder apparatus and to identify the effect of Pilates exercises on agility, coordination, and motor sequences of third-year female students in artistic gymnastics. The researcher adopted the experimental method to achieve the objectives of the study and to verify its hypotheses, as it is suitable for the nature and problem of the research. In selecting the research population, the researcher carefully chose the sample using a purposive method, clarifying its elements and constituent units. The research population consisted of third-year female students at the College of Physical Education and Sports Sciences for Women / University of Baghdad, with a total of 20 stud

... Show More
Preview PDF
Publication Date
Mon Mar 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
Measuring and analyzing the effect of labor productivity and capital on manufacturing industries in Iraq and some Arab countries for the period 1990-2000
...Show More Authors

يلعب القطاع الصناعي التحويلي في أي قطر دوراً هاماً في تحقيق التنمية الصناعية، اذ تتحد تاثيراته فيها على طبيعة الدور المرسوم له وعلى مدى فاعلية هذا القطاع الحيوي الذي يعد اتجاه نحو التعاظم المضطرد لمستويات الانتاجية " Levels of productivity"والتنويع الانتاجي والتدفق المستمر للتجديد التكنولوجي من اهم دلائله.

ويعد مؤشر الانتاجية بصفة عامة وانتاجيتي العمل وراس المال بصفة خاصة من الم

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Thu Jul 31 2025
Journal Name
مجلة واسط للعلوم الانسانية
A Schizoanalytic Reading of Crimp’s Attempts on Her Life
...Show More Authors

The concept of Assemblage appeared obviously in Postdramatic works, where a character or a text may stand as an assemblage of potentialities in the sense that it signifies unidentified subjectivity. Assemblages are constituted essentially of heterogeneous elements yet fused without specific demarcations. In order to enjoy the desired productivity at a "smooth pace," the regularities of political and societal institutionalization are disseminated. To achieve this dissemination, Deleuze-Guattari suggest an unsatiated platform of a "Body without Organs' (BwO), where desire escapes identification. Martin Crimp (b. 1956) defines his off-stage characters in Attempts on Her Life (1997), Anne, or whatever the name is, as a 'BwO', upon which

... Show More
View Publication
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
A New Separable Moments Based on Tchebichef-Krawtchouk Polynomials
...Show More Authors

View Publication
Scopus (22)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Fri Jun 11 2021
Journal Name
Journal Of Computing And Information Technology
A Survey on Emotion Recognition for Human Robot Interaction
...Show More Authors

With the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (7)
Scopus Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-

... Show More
View Publication
Publication Date
Thu Feb 01 2018
Journal Name
Italian Journal Of Pure And Applied Mathematics
A note on s-acts and bounded linear operators
...Show More Authors

Scopus (1)
Scopus
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
A note on an –module with -pure intersection property
...Show More Authors

Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.

View Publication
Crossref