Preferred Language
Articles
/
jcois-2143
Concealment of Offenders: Its Conceptions, Evidence, Objectives, Criteria
...Show More Authors

Concealment of the Offenders:

Its Conceptions, Evidence, Objectives, Criteria

This study discusses the concealment of the offenders, but also emphasize the importance of clarifying this concept. Furthermore, it differentiates between this concept and other relevant concepts. Moreover, this study explains that the ruling of the concealment of the offenders is required by sharia. This is evident by many proofs of the Quran and the Sunnah in addition to being in line with the sharia’s objectives.

Additionally, the study mentions several advantages to the concealment of an offender and the disadvantages of reporting an offender. Examples include ensuring the Islamic community cohesion, encouraging offenders to repent, and warning from spreading immorality among Muslims.

According to the texts of the sharia scholars, the sharia has given high interests to the concealment of the offender. Particularly, the sharia ruling of this matter is systematically arranged with sharia-based criteria. This implies that the sharia texts on the concealment of the offender are not in conflict. Although some texts imply reporting on offenders, sharia scholars have chosen that there is no conflict among evidence of the sharia (al-jam’ bayn al-adillah). Therefore, any meaning contradicts the obligation of concealment of the offenders is limited to situations that some criteria have not been applied in.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
الوجود الفلسطیني في لبنان وانعكاسات الازمة الفلسطینیة على الوضع اللبناني: الوجود الفلسطیني في لبنان وانعكاسات الازمة الفلسطینیة على الوضع اللبناني
...Show More Authors

Abstract:
The Palestinian existence in Lebanan is regard as active Arab powers
in political system in Lebanan. This existence arises exactly in Lebanan on 5 /
June / 1967. The Palestinians distributed from south to north, from Bayrouth

to Al-Bquaa, also they lived in Camps like (Tal Al-Zater), (Aen Al-hlwa, Mya –
Mya) and so on.
The armed Palestinian resistance breakout from these camps in
Lebanan against Israel, Lebanon rejected this conflict to avoid any
confrontation with Israel which have big military and high ability in different
aspects in addition security of Lebanan did not connected with security of
Arab states in other side the civil war which break out in Lebanon impact upon
Palestinians

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 31 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
CHITOSAN EFFECT ON MEAT QUALITY IN LOCAL QUAILS MALE: CHITOSAN EFFECT ON MEAT QUALITY IN LOCAL QUAILS MALE
...Show More Authors

The aim of this study is to know the effect of different percentages of chitosan added to drinking water on the weight and quality of quail meat, physical anatomy in terms of (the body of the long carcass, the girth of the chest, the length of the thigh bones, the thigh racket, the fullness of the chest), chemical analysis (protein, moisture, fat and ash) and sensory evaluation of quail meat. It was purchased 320 Iraqi-origin birds of quail and one day old. Chicks were randomly distributed to three equal groups' treatments and treated with chitosan and added to the drinking water: the first treatment (0.1 gm./L water only as a control treatment), the second treatment (0.2 gm./L of chitosan was added to the drinking water) and the

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Effect of risk selection policy for life insurance on the prodectivity of iraqi insurance company
...Show More Authors

The life insurance companies need a sound system to use it in selecting Insurable risks so they can avoid or reduce possible losses that may be insured to a minimum levels , But the application within IRAQI INSURANCE  COMPANY reflects that it still depends on a traditional ways in the procedures used to select that risks .

                 This  research represents an attempt to put acceptable suggestions about developing a system for selecting insurable risks which used now by iraqi insurance company by recognizing the risks of life insurance , determining kinds of risks which can difined as normal and upnormal risks , rectification of the

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Iraqi Journal Of Physics
Effect of Deposit Au thin Layer Between Layers of Perovskite Solar Cell on Cell's Performance
...Show More Authors

The present work aims to fabricate n-i-p forward perovskite solar cell (PSC) withئ structure (FTO/ compact TiO2/ compact TiO2/ MAPbI3 Perovskite/ hole transport layer/ Au). P3HT, CuI and Spiro-OMeTAD were used as hole transport layers. A nano film of 25 nm gold layer was deposited once between the electron transport layer and the perovskite layer, then between the hole transport layer and the perovskite layer. The performance of the forward-perovskite solar cell was studied. Also, the role of each electron transport layer and the hole transport layer in the perovskite solar cell was presented. The structural, morphological and electrical properties were studied with X-ray diffractometer, field emission s

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
The Effect of Walled Nano-Carbon on the Physical, Thermal and Mechanical Properties of Epoxy
...Show More Authors

The physical, the thermal and the mechanical properties of Nano-composites, that consisted of Polyprime EP epoxy that reinforced by multi-walled carbon nanotubes (MWCNTs), have been studied. Various loading ratios, 0.1, 0.5, and 1 wt. %of MWCNT shave been infused into epoxy by a magnetic stirrer and then the hardener mixed with the mthat supplied with the epoxy. All sample shave been cutting using CNC machine. Tensile test, three-point bending, hardness tests, lee's disk, differential scanning calorimetry, water absorption and dielectric and electrical conductivity test were utilized on unfilled, MWCNT-filled epoxy to identify the loading effect on the properties of materials. Scanning electron microscopy (SEM) was used to determine the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 19 2004
Journal Name
Association Of Arab Universities Journal Of Engineering
تأثير وجود المحرمات على تنامي الفشل في المنحدرات
...Show More Authors

Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Fast Processing RNA-Seq on Multicore Processor
...Show More Authors

RNA Sequencing (RNA-Seq) is the sequencing and analysis of transcriptomes. The main purpose of RNA-Seq analysis is to find out the presence and quantity of RNA in an experimental sample under a specific condition. Essentially, RNA raw sequence data was massive. It can be as big as hundreds of Gigabytes (GB). This massive data always makes the processing time become longer and take several days. A multicore processor can speed up a program by separating the tasks and running the tasks’ errands concurrently. Hence, a multicore processor will be a suitable choice to overcome this problem. Therefore, this study aims to use an Intel multicore processor to improve the RNA-Seq speed and analyze RNA-Seq analysis's performance with a multiproce

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Watermark Based on Singular Value Decomposition
...Show More Authors

Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sat Aug 10 2013
Journal Name
Journal Of Accounting And Financial Studies (jafs)
التهرب الضريبي واثره على التنمية الاقتصادية في العراق
...Show More Authors

Highlights the role of taxes in being a major source of funding sources internal economic and social development, and then, any decrease in tax revenue caused by tax evasion, for example, would weaken the government's ability to finance their investments and core financing private sector investment as a result of reduced ability to increase their reserves's cash banks, as well as the weakening of the effectiveness of tax evasion taxes as a tool to guide economic activity in the framework of service for development, and to achieve justice. And the statement of the reasons for and methods of evasion mandated to pay the tax due on them, whether legitimately or illegal with the statement of the proposed methods to tackle tax evasion and elimina

... Show More
Preview PDF
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Windows-Based Special Applications Router
...Show More Authors

The design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program

... Show More
View Publication Preview PDF