Preferred Language
Articles
/
jcois-2032
Shariah ruling on advice
...Show More Authors

Abstract

Research title: The legal ruling of advice.

This research deals with the topic of advice, as the research included the following:

Preamble: I explained in it the meaning of advice in the Qur’an and Sunnah, and that what is meant by it is a good performance of the duty, then explaining its importance, importing it, and the difference between advice and what is similar to it, from enjoining good, denial, reproach and reprimand, backbiting and the will.

The first topic: It dealt with the ruling on advice, whether it is recommended or disliked, or forbidden, because what is meant by it is to give advice to others may be an obligation in kind, or it may be desirable or disliked, or forbidden.

The second topic: It includes a statement of the justifications for advice, which are specific to the discharge of liability, the protection of the honor of Sharia, the preservation of the legal necessities, and mercy with the advised.

And the third topic: a statement of the guidelines for advice, in which there are eleven controls.

And the fourth topic: It includes a statement of the types of advice with several considerations, namely: the advising carrier, the advised, the subject, and the method.

Keywords: advice - censure - defamation - the difference between advice and others - advice controls

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Feb 04 2022
Journal Name
Neuroquantology
Detecting Damaged Buildings on Post-Hurricane Satellite Imagery based on Transfer Learning
...Show More Authors

In this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performa

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Political Sciences Journal
Constructivism Theory in International Relations (Case Study on the War on Terrorism)
...Show More Authors

        The topic of the research revolves around constructivist theory, which is one of the most important theories that added weight to the theoretical and epistemological field of international relations. The constructivist theory studies international relations from a completely different side of theories by focusing on the social aspects of international relations, and by looking at international relations as social constructs. Ideas, cultures, norms, standards and language play a major role in their formation. The study also examines the state of the war on terrorism as it represents one of the most international cases in which its composition and composition coincide with constructive ideas and a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Political Sciences Journal
The Chinese Economy and its impact on international trade (Study on the role of the port of Gwadar)
...Show More Authors

China's economic policy and its huge capabilities operate according to an expansion strategy, especially in investing foreign projects, as the past ten years have witnessed a major development in the elements of comprehensive strength, especially in the economic field, in 2014 China launched the largest initiative in the world, represented by the Belt and Road Project (BRI), which links nearly 70 countries, through this project, a very important region has emerged, which is (the port of cadres) in Pakistan, as China has headed towards that region and given the highest importance that is in its interest in the first place regardless of the great Pakistani interest, This is consistent with its future aspirations, especially after breaking

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 04 2010
Journal Name
Journal Of Educational And Psychological Researches
The Factorial Structure of The Emotional Intelligence Scale to Bar-On Applied on Students from Preparatory School in Baghdad City.
...Show More Authors

The aim of the study was to know the factors analysis of scale Bar-On & Parker, post analysis is found fourteen factors for the first degree of the scale. Also we extracted five factors from the second degree.

  The scale consists of (60) items , applied on sample of (200) students (Male &Female ) age (15-18) years randomly chosen from preparatory schools . The scale unveiled satis factors  validity and reliability. An others aims is to low the  emotional  Intelligence level and  know the difference of statistical in sex , age variable and the specialization variable .The result was no difference of statistical in sex and specialization variable , but the difference appear

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 31 2025
Journal Name
Joiv : International Journal On Informatics Visualization
RC5 Performance Enhancement Based on Parallel Computing
...Show More Authors

This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Sep 04 2016
Journal Name
Baghdad Science Journal
Some Results on Weak Essential Submodules
...Show More Authors

Throughout this paper R represents commutative ring with identity and M is a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of weak essential submodules which introduced by Muna A. Ahmed, where a submodule N of an R-module M is called weak essential, if N ? P ? (0) for each nonzero semiprime submodule P of M. In this paper we rewrite this definition in another formula. Some new definitions are introduced and various properties of weak essential submodules are considered.

View Publication Preview PDF
Crossref
Publication Date
Sun Sep 04 2016
Journal Name
Baghdad Science Journal
Some Results on Weak Essential Submodules
...Show More Authors

Throughout this paper R represents commutative ring with identity and M is a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of weak essential submodules which introduced by Muna A. Ahmed, where a submodule N of an R-module M is called weak essential, if N ? P ? (0) for each nonzero semiprime submodule P of M. In this paper we rewrite this definition in another formula. Some new definitions are introduced and various properties of weak essential submodules are considered.

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
Notes on Exponential Distribution
...Show More Authors

المتغير العشوائي X  له توزيع أسي اذا كان له دالة احتمالية الكثافة بالشكل:

عندما  ، هذه هي الحالة الخاصة لتوزيع كاما.

غالباً جداً ولسبب معقول تأخذ . الحالة الخاصة لـ (1) التي نحصل عليها تسمى بالتوزيع الاسي لمعلمة واحدة.

اذا كانت  ، ، التوزيع في هذه الحالة يسمى التوزيع الاسي القياسي

اما بالنسب

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
On µ-Semiregular Module
...Show More Authors
Abstract<p>Let R be an associative ring with identity and let M be right R-module M is called μ-semi hollow module if every finitely generated submodule of M is μ-small submodule of M The purpose of this paper is to give some properties of μ-semi hollow module. Also, we gives conditions under, which the direct sum of μ-semi hollow modules is μ-semi hollow. An R-module is said has a projective μ-cover if there exists an epimorphism <italic>f</italic>:P→M Where P is a projective R-module and ker (<italic>f</italic>)<sub>≪</sub> P.And study some properties of Projective μ-cover of M. Were studied Moreover, An module M is μ-semiregular module if every cyclic</p> ... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun May 17 2020
Journal Name
Iraqi Journal Of Science
On Semiannahilator Supplement Submodules
...Show More Authors

Let R be associative; ring; with an identity and let D be unitary left R- module; . In this work we present semiannihilator; supplement submodule as a generalization of R-a- supplement submodule, Let U and V be submodules of an R-module D if D=U+V and whenever Y≤ V and D=U+Y, then annY≪R;. We also introduce the the concept of semiannihilator -supplemented ;modules and semiannihilator weak; supplemented modules, and we give some basic properties of this conseptes.

Scopus (2)
Scopus Crossref