Preferred Language
Articles
/
jcois-2028
Historical development of Islamic jurisprudence - Develop a model
...Show More Authors

 

       Praise be to God, and prayers and peace be upon our master Muhammad, the Messenger of God, and upon his family, companions, and those who are guided by his guidance.

Then:

       Our Islamic jurisprudence and its basic principles are fixed, namely: the Noble Qur’an, then the Prophet’s Sunnah, then consensus, then analogy. However, it is characteristic of what makes it developed to meet the requirements of renewed life, including: sent interests, custom, approval, blocking pretexts, changing times. That is why it went through different stages, growth, brilliance, stagnation and endowment; Therefore, many scholars of Islamic jurisprudence divided its stages into four sections: the stage of infancy, the stage of youth, the stage of eloquent and perfect, and the stage of old age.

       This research deals with the stage of emergence, and focuses on two sections and a conclusion.

First: The sources of jurisprudence in the era of infancy.

Second: the characteristics of legislation in the process of emerging.

Then the conclusion of the most important results.

-God grants success -

Keywords: jurisprudence, development, genesis.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 25 2017
Journal Name
Al-khwarizmi Engineering Journal
A new Cumulative Damage Model for Fatigue Life Prediction under Shot Peening Treatment
...Show More Authors

 Abstract

In this paper, fatigue damage accumulation were studied using many methods i.e.Corton-Dalon (CD),Corton-Dalon-Marsh(CDM), new non-linear model and experimental method. The prediction of fatigue lifetimes based on the two classical methods, Corton-Dalon (CD)andCorton-Dalon-Marsh (CDM), are uneconomic and non-conservative respectively. However satisfactory predictions were obtained by applying the proposed non-linear model (present model) for medium carbon steel compared with experimental work. Many shortcomings of the two classical methods are related to their inability to take into account the surface treatment effect as shot peening. It is clear that the new model shows that a much better and cons

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 03 2020
Journal Name
Journal Of Applied Mathematics
Order and Chaos in a Prey-Predator Model Incorporating Refuge, Disease, and Harvesting
...Show More Authors

In this paper, a mathematical model consisting of a prey-predator system incorporating infectious disease in the prey has been proposed and analyzed. It is assumed that the predator preys upon the nonrefugees prey only according to the modified Holling type-II functional response. There is a harvesting process from the predator. The existence and uniqueness of the solution in addition to their bounded are discussed. The stability analysis of the model around all possible equilibrium points is investigated. The persistence conditions of the system are established. Local bifurcation analysis in view of the Sotomayor theorem is carried out. Numerical simulation has been applied to investigate the global dynamics and specify the effect

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Jun 15 2022
Journal Name
Journal Of Sensors
A Modern Approach towards an Industry 4.0 Model: From Driving Technologies to Management
...Show More Authors

Every so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberph

... Show More
View Publication
Scopus (101)
Crossref (89)
Scopus Clarivate Crossref
Publication Date
Wed Sep 01 2021
Journal Name
المجلة السياسية والدولية
Foreign Policy and Asymmetric Threats The United States after 2001 as a model
...Show More Authors

يشهد المسرح الدولي قضايا مستجدة ومستحدثة مثل تعدد الفاعلين من الدول ومن غير الدول وتزايد مساحات نفوذهم وتأثيرهم ،ومن جانب اخر أثرت جائحة كورونا على البيئة والمناخ بشكل ملموس على جوانب عدة. فضلا عن ذلك تأثرت جميع المجتمعات البشرية بالإرهاب والهجمات الالكترونية وغيرها ومن بينها دول والمجتمع الدولي بإفراده مؤسسات وكيان اقتصادي وسياسي وقانوني وأمني وامتداد اثاره واسبابه الكثيرة والمتداخلة وما يثيره من خلق حا

... Show More
Preview PDF
Publication Date
Fri Oct 26 2018
Journal Name
Al–bahith Al–a'alami
University youth attitudes towards mobile phone Companies advertisements in Social networking sites): :(Facebook as sample
...Show More Authors

The advertising has emerged as an effective force and an effective instrument upon with all organizations and companies depend on achieving their goals. In additional to the need to use promote sales, The nature and objective of advertising go beyond the scope of specific personal communication to a broader and more effective range for consumers from multiple groups and combination play need to use as well as the need to use means of communication than com convey the message more professional, The coincides with the rapid and remarkable development of all different media technologies and as much as possible social networking sites including mobile phone companies. The advertising has emerged as an effective force and an effective instrum

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 22 2018
Journal Name
Arab Science Heritage Journal
السحر السحر وعقوبته في المجتمع الإسلامي من خلال القرآن والسنة النبويةالشريفة
...Show More Authors

إن المعتقدات الخاصة بالسحر والعرافة قديمة جدا كون الإنسان عرف الكثير منها ومارس أنواع من الأساليب السحرية منذ أقدم العصور ومن أكثر العلوم التي حرم تعليمها ونشرها هو علم السحر والسيمياء أو الكيمياء والشعبذة والحيل . ومع ذلك عرف السحر من قبل سكان بلاد وادي الرافدين ولاسيما في بابل والسحر يمثل أقدم مرحلة في تطور العقل البشري .

View Publication Preview PDF
Publication Date
Tue Oct 06 2020
Journal Name
College Of Islamic Sciences
الصناعة وأثرها في بلاد المشرق الإسلامي خلال العصر العباسي 132- 656هـ
...Show More Authors

The process of doing many kinds of industries , crafts , professions around Islamic Arabian State , they enable us to say that Arab Muslims over their homelands had been occupied various types of crafts and manufacturing before emergence Islam . Moreover Islam encouraged to work within manufacture field . And These matters were clarified through verses of the Holy Qur’an and honored prophetic guidance ( Sunna  )  . Whereas Arab Muslims applied principle “ Free of Business “  . They admitted to different social groups such as pact – fellows people  to profession or craft which they desire to work . We have to not forget that Arab Muslims had broken all restraints and shackles which had restricted the worker bef

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 15 2020
Journal Name
Al-academy
Characteristics of Environment in Contemporary Iraqi and Iranian Pottery A Comparative Study (Saad Shakir- Muhammad Mahdi) A Model: قحطان عدنان محمود
...Show More Authors

The Iraqi and Iranian pottery has a significant role in the contemporary world pottery space, despite the fact that influences created those formulation, thus the researcher supposes that there is a relation between the potter and his environment within Iraq's environment and Iran's environment, which are similar at times and different at other times. The researcher, hence, found himself in front of a number of questions:
1- How much was the Iraqi potter inspired by the environment compared to the Iranian potter?
2- Has the Iraqi and Iranian pottery been really inspired by the environment items or there were modified metaphors?
The current research aims at (identifying the influential environmental characteristics in the Iraq

... Show More
View Publication Preview PDF
Crossref