Preferred Language
Articles
/
jcois-2032
Shariah ruling on advice
...Show More Authors

Abstract

Research title: The legal ruling of advice.

This research deals with the topic of advice, as the research included the following:

Preamble: I explained in it the meaning of advice in the Qur’an and Sunnah, and that what is meant by it is a good performance of the duty, then explaining its importance, importing it, and the difference between advice and what is similar to it, from enjoining good, denial, reproach and reprimand, backbiting and the will.

The first topic: It dealt with the ruling on advice, whether it is recommended or disliked, or forbidden, because what is meant by it is to give advice to others may be an obligation in kind, or it may be desirable or disliked, or forbidden.

The second topic: It includes a statement of the justifications for advice, which are specific to the discharge of liability, the protection of the honor of Sharia, the preservation of the legal necessities, and mercy with the advised.

And the third topic: a statement of the guidelines for advice, in which there are eleven controls.

And the fourth topic: It includes a statement of the types of advice with several considerations, namely: the advising carrier, the advised, the subject, and the method.

Keywords: advice - censure - defamation - the difference between advice and others - advice controls

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Review Of International Geographical Education Online
Quality of Transition to E-Learning under Corona pandemic: An Application Study in College of Administration and Economics, Baghdad University
...Show More Authors

E-learning is a lifeline for the educational process, which contributed to the sustainability of working educational organizations and prevented them from stopping, so the study came to measure the compatibility between E-learning quality dimensions (information technology, educational curricula, teaching methods, and intellectual capital of educational institution) as an independent variable, and educational services quality dimensions represented by (safety, tangibility, reliability and Confidence) as a dependent variable. The sample was 150 teachers was drawn from the College of Administration and Economics community of 293 teachers through the use of several statistical methods to measure the degree of correlation and impact between the

... Show More
Scopus
Publication Date
Sat Aug 01 2020
Journal Name
Key Engineering Materials
Compressive Strength Performance of Reactive Powder Concrete Using Different Types of Materials as a Partial Replacement of Fine Aggregate
...Show More Authors

Reactive Powder Concrete (RPC) can be incorporate as a one of the most important and progressive concrete technology. It is a special type of ultra-high strength concrete (UHSC) that’s exclude the coarse aggregate from its constitutive materials. In this research an experimental study had been carried out to investigate the effect of using three types of materials (porcelain aggregate) and others sustainable materials (glass waste and granular activated carbon) as a partial replacement of fine aggregate. Four percentages had considered (0, 10, 15 and 20) % to achieve better understanding for the influence of these materials upon the compressive strength of RPC. Four curing ages had included in this study, these are; 7, 28, 60 and

... Show More
Scopus (6)
Crossref (7)
Scopus Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
Development Binary Search Algorithm
...Show More Authors

There are many methods of searching large amount of data to find one particular piece of information. Such as find name of person in record of mobile. Certain methods of organizing data make the search process more efficient the objective of these methods is to find the element with least cost (least time). Binary search algorithm is faster than sequential and other commonly used search algorithms. This research develops binary search algorithm by using new structure called Triple, structure in this structure data are represented as triple. It consists of three locations (1-Top, 2-Left, and 3-Right) Binary search algorithm divide the search interval in half, this process makes the maximum number of comparisons (Average case com

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 20 2019
Journal Name
Political Sciences Journal
"Khurasan statehood" : new centralization of ISIS and limits of incursion and development
...Show More Authors

Abstract This study aims to discover the ways that adopted by extremism to expand to new geographical areas, in order to spread out its ideology, which led to create new geo-strategic zone, aims to recognize ISIS’s strategy to move towards new geographic locations and the motivations behind these transformations, the study also analyses all aspects of this strategy, the group’s relationship with other terrorist groups in these areas and limits of the competition between them. The study also highlights the factors that have led ISIS to move to new geographical areas and its techniques to control them.

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 02 2019
Journal Name
Journal Of The College Of Languages (jcl)
"The wisdom of the Abraham son of Izra": "החכמה אצל המשורר אברהם בן עזרא"
...Show More Authors

Abraham son of Izra, the poet, the philosopher, the grammarian, and the Turah exegesis, is considered one of the famous poets in the era of Islamic reign in Spain which is called the "Golden Era". He was taught all types of teaching which was rich in Jewish literary products. He learned Arabic and studied Arabic language and literature. He travelled a lot, and made tours within Spanish places, and even reached the North of Africa. He preferred living with Muslim rulers in the south of Spain, like the rest of the Jews who emigrated from the north of Spain to the South in search for freedom and to participate in higher positions of the Islamic Palace. He was influenced by Arabic culture, and even translated "Th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
A Generalization of t-Practical Numbers
...Show More Authors

This paper generalizes and improves the results of Margenstren, by proving that the number of -practical numbers  which is defined by   has a lower bound in terms of . This bound is more sharper than Mangenstern bound when  Further general results are given for the existence of -practical numbers, by proving that the interval contains a -practical for all

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2024
Journal Name
Baghdad Science Journal
Hetero-associative Memory Based New Iraqi License Plate Recognition
...Show More Authors

نتيجة للتطورات الأخيرة في أبحاث الطرق السريعة بالإضافة إلى زيادة استخدام المركبات، كان هناك اهتمام كبير بنظام النقل الذكي الأكثر حداثة وفعالية ودقة (ITS) في مجال رؤية الكمبيوتر أو معالجة الصور الرقمية، يلعب تحديد كائنات معينة في صورة دورًا مهمًا في إنشاء صورة شاملة. هناك تحدٍ مرتبط بالتعرف على لوحة ترخيص السيارة (VLPR) بسبب الاختلاف في وجهة النظر، والتنسيقات المتعددة، وظروف الإضاءة غير الموحدة في وقت الحصول

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Synthesis, Characterization and Biological Activity of Mixed Ligand Metal Salts Complexes with Various Ligands
...Show More Authors

Metal (III) and (II) coordination compounds of o- phenylenediamine, oxalic acid dihydrate and 8-hydroxyquinoline were synthesized for mixed ligand complexes and characterized using FT-IR, UV-Vis and mass spectra, atomic absorption, elemental analysis, electric conductance and magnetic susceptibility measurements. In addition, thermal behavior (TGA) of the metal complexes (1-6) showed good agreement with the formula suggested from the analytical data. The stoichiometric reaction between the metal (III) and (II) ions with three various ligands in molar ratio at aqueous ethyl alchol for (1:1:1:1) (M: O-PDA: OA: 8-HQ) [where M = Cr+3, Mn+2, Co+2, Ni+2. Cu+2 and Zn+2; O-PDA = O-Phenylenediamine; OA = Oxalic acid and 8-HQ = 8-Hydroxyquinoline]. R

... Show More
View Publication
Scopus (32)
Crossref (8)
Scopus Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref