Preferred Language
Articles
/
jcois-2143
Concealment of Offenders: Its Conceptions, Evidence, Objectives, Criteria
...Show More Authors

Concealment of the Offenders:

Its Conceptions, Evidence, Objectives, Criteria

This study discusses the concealment of the offenders, but also emphasize the importance of clarifying this concept. Furthermore, it differentiates between this concept and other relevant concepts. Moreover, this study explains that the ruling of the concealment of the offenders is required by sharia. This is evident by many proofs of the Quran and the Sunnah in addition to being in line with the sharia’s objectives.

Additionally, the study mentions several advantages to the concealment of an offender and the disadvantages of reporting an offender. Examples include ensuring the Islamic community cohesion, encouraging offenders to repent, and warning from spreading immorality among Muslims.

According to the texts of the sharia scholars, the sharia has given high interests to the concealment of the offender. Particularly, the sharia ruling of this matter is systematically arranged with sharia-based criteria. This implies that the sharia texts on the concealment of the offender are not in conflict. Although some texts imply reporting on offenders, sharia scholars have chosen that there is no conflict among evidence of the sharia (al-jam’ bayn al-adillah). Therefore, any meaning contradicts the obligation of concealment of the offenders is limited to situations that some criteria have not been applied in.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 30 2024
Journal Name
مجلة دراسات دولية
العوامل المؤثرة على اتجاهات الناخبات في العراق دراسة ميدانية
...Show More Authors

تهدف هذه الد ا رسة الى التعرف على السلوك التصويتي للمقترعات الع ا رقيات. والأسباب التي تدفعهن للمشاركة في عملية الاقت ا رع، والعوامل المؤثرة في خيا ا رتهن التصويتية والأسباب التي تجعلها تفضل اختيار الرجل أو اختيار ام أ ر ة ، وأخي ا رً مدى م ا رعاة اج ا رءات الاقت ا رع لظروف النساء واحتياجاتهن واهتماماتهن. اعتم دتالد ا رسة منهجاً وصفياً واستعان ت بطريقة المسح بالعينةاما الاداة الرئيسية فهي الاستمارة الاستبيانية.

... Show More
Publication Date
Wed Jun 01 2022
Journal Name
مجلة الباحث للعلوم القانونية
الالتزام بضمان سلامة الشخص الحاصل على تطعيم (كوفيد-19)
...Show More Authors

بعد مرور عام واكثر على ظهور فيروس كورونا والعالم يواجه تسونامي تلك الجائحة التي تكاد تعصف بالوجود البشري برمته لذا اخذت البشرية على عاتقها مواصلة الجهود والابحاث للوصول الى علاج طبي يتم من خلاله مواجهة هذا الفيروس او التقليل من آثاره التي تهدد الحياة البشرية بالموت المباشر دون الاصابة، مما نتج عن تلك الجهود مجموعة من اللقاحات التي تبنتها الشركات العالمية المسؤولة الا ان الضرورة القصوى التي نتجت عنها تلك الل

... Show More
View Publication
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Prof. Mohammad Al-Drubi's Manuscripts Editing Methodology
...Show More Authors

Efforts of evaluating manuscripts have developed into sciences that take interest into the development of authorship movement. Expanding the rules and fundamentals of this scientific process along with the growing use of modern methods and techniques contributed further to its development.
Such a disciplinedemands comprehensive knowledge in various fields to reach the most valid results that help reveal significant aspects of the cultural heritage since such a process is an ethical responsibility .Therefore, the editor has to be patient and honest in correcting mistakes, choosing the most acceptable narration and pinpointing the additions and differences as well as other requirements of serious editing.
The study was divided into a

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Online Sumarians Cuneiform Detection Based on Symbol Structural Vector Algorithm
...Show More Authors

The cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.

View Publication Preview PDF
Publication Date
Tue Mar 31 2015
Journal Name
Al-khwarizmi Engineering Journal
Temperature Effect on Photovoltaic Modules Power Drop
...Show More Authors

 Abstract

In order to determine what type of photovoltaic solar module could best be used in a thermoelectric photovoltaic power generation. Changing in powers due to higher temperatures (25oC, 35oC, and 45oC) have been done for three types of solar modules: monocrystalline , polycrystalline, and copper indium gallium (di) selenide (CIGS). The Prova 200 solar panel analyzer is used for the professional testing of three solar modules at different ambient temperatures; 25oC, 35oC, and 45oC and solar radiation range 100-1000 W/m2. Copper indium gallium (di) selenide module   has the lowest power drop (with the average percent

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 08 2025
Journal Name
مجلة حموربي للدراسات
الازمة السياسية الماليزية واثرها على ترسيخ الديمقراطية 2018-2022
...Show More Authors

View Publication
Publication Date
Tue Jun 30 2015
Journal Name
Al-khwarizmi Engineering Journal
Integral Sliding Mode Control Design for Electronic Throttle Valve System
...Show More Authors

Abstract

 One of the major components in an automobile engine is the throttle valve part. It is used to keep up with emissions and fuel efficiency low. Design a control system to the throttle valve is newly common requirement trend in automotive technology. The non-smoothness nonlinearity in throttle valve model are due to the friction model and the nonlinear spring, the uncertainty in system parameters and non-satisfying the matching condition are the main obstacles when designing a throttle plate controller.

In this work, the theory of the Integral Sliding Mode Control (ISMC) is utilized to design a robust controller for the Electronic Throttle Valve (ETV) system. From the first in

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 30 2018
Journal Name
حولیات کلیة الآداب جامعة عین شمس
اعتماد الجمهور العراقي على الصحف وعلاقته بمستوى معرفته العامة
...Show More Authors

يدرس هذا البحث مشكلة اعتماد الجمهور العراقي على الصحف، باعتبارها إحدى وسائل الإعلام التقليدية، في تكوين معلوماته ومعرفته العامة. وهي دراسة وصفية اعتمدت المنهج الوصفي المسحي الذي يصور الظروف أو الاتجاهات الحالية للظاهرة قيد الدراسة ويحاول تفسيرها. استخدم الباحث الاستبانة في المقام الأول كأداة بحث، حيث تم تصميمها وتوزيعها على عينة مكونة من 150 باحثا قصديا من قراء وقراء الصحف. وينتهي الباحث بالنتائج التالية: إ

... Show More
View Publication
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref