Preferred Language
Articles
/
jcois-2143
Concealment of Offenders: Its Conceptions, Evidence, Objectives, Criteria
...Show More Authors

Concealment of the Offenders:

Its Conceptions, Evidence, Objectives, Criteria

This study discusses the concealment of the offenders, but also emphasize the importance of clarifying this concept. Furthermore, it differentiates between this concept and other relevant concepts. Moreover, this study explains that the ruling of the concealment of the offenders is required by sharia. This is evident by many proofs of the Quran and the Sunnah in addition to being in line with the sharia’s objectives.

Additionally, the study mentions several advantages to the concealment of an offender and the disadvantages of reporting an offender. Examples include ensuring the Islamic community cohesion, encouraging offenders to repent, and warning from spreading immorality among Muslims.

According to the texts of the sharia scholars, the sharia has given high interests to the concealment of the offender. Particularly, the sharia ruling of this matter is systematically arranged with sharia-based criteria. This implies that the sharia texts on the concealment of the offender are not in conflict. Although some texts imply reporting on offenders, sharia scholars have chosen that there is no conflict among evidence of the sharia (al-jam’ bayn al-adillah). Therefore, any meaning contradicts the obligation of concealment of the offenders is limited to situations that some criteria have not been applied in.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (28)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Tue Mar 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Developing and Sustaining a Multilevel Competitive Learning Organization – A Behavioral and Cognitive Approach
...Show More Authors

To maintain a sustained competitive position in the contemporary environment of  knowledge  economy,  organizations  as an open social systems must have an ability to learn and know  how to adapt to rapid changes  in a proper fashion so that organizational objectives will be achieved efficiently and effectively.  A multilevel approach is adopted proposing that organizational learning suffers from the lack of interest about the strategic competitive performance of the organization. This remains implicit almost in all models of organizational learning and there is little focus on how learning organizations achieve sustainable competitive advantage . A dynamic model that captures t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Sep 01 2014
Journal Name
Al-khwarizmi Engineering Journal
Using TermoDeck System for Pre-Cooling/ Heating to Control the Building Inside Conditions
...Show More Authors

In this paper, experimental study has been done for temperature distribution in space conditioned with Ventilation Hollow Core Slab (TermoDeck) system. The experiments were carried out on a model room with dimensions of (1m 1.2m 1m) that was built according to a suitable scale factor of (1/4). The temperature distributions was measured by 59 thermocouples fixed in several locations in the test room. Two cases were considered in this work,  the first one during unoccupied period at night time (without external load) and the other at day period with external load of 800W/m2 according to solar heat gain calculations during summer season in Iraq. All results confirm the use of TermoDeck system for ventilation and cooling/heat

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 13 2011
Journal Name
Iraqi Journal Of Laser
The Efficacy of Er:YAG Laser on Intrapulpal Temperature Rise of Class V Cavity Preparation
...Show More Authors

The objective of this study is to determine the efficacy of class V Er:YAG laser (2940 nm) cavity preparation and conventional bur cavity preparation regarding Intrapulpal temperature rise during cavity preparation in extracted human premolar teeth. Twenty non carious premolar teeth extracted for orthodontic purposes were used and class V cavity preparation was applied both buccal and lingual sides for each tooth .Samples were equally grouped into two major groups according to cavity depth (1mm and 2mm). Each major group was further subdivided into two subgroupsof ten teeth for each (twenty cavities for each subgroup). TwinlightEr:YAG laser (2940 nm) with 500mJ pulse energy, P.R.R of 10 Hz and 63.69 J/cm2 energy density was used. The ana

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The compatibility of the Development Fund for Iraq to the requirements of sovereign wealth funds An analytical study of the legal framework and institutional structure in accordance with the standards of the Santiago
...Show More Authors

Sovereign wealth funds have attracted the attention of the governments of the oil and non-oil countries alike, with a variation of the size of those funds to those states, based on the size of the financial surpluses resulting from Alriadat oil or foreign reserves, or state revenues for other sovereign assets. Raj use these funds remarkably during the financial crises the world has seen, including the crisis of 2008-2007., And Iraq is a oil-producing countries, which has the third largest reserves of crude oil (Crude Oil) at the level of the Arab world and of 140 300)) million barrels after Saudi Saudi Arabia and the Islamic Republic of Iran, and the fourth reserves of crude oil in the world after issued Venezuela to the reserve

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Auditor's Evaluation of The Detected Misstatements and Their Reflection on The Administration's Actions is: an Applied Research in the General Company for Grain Processing
...Show More Authors

Some auditors may think that the audit process ends with discovering misstatements and informing management about them, while the discovery of misstatements may be classified by some as the first step in the phase of separating these distortions, as the auditor should collect these misstatements, evaluate them and detail them into misstatements involving errors or misstatements involving fraud Then evaluating it to material or immaterial according to what was stated in the international auditing standards and directing management to amend the essential ones.  The importance of this research lies in identifying the concept of distortions and their types, identifying the method of evaluating distortions into substantial and non-essent

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Study the Effect of Annealing on Optical and Electrical Properties of ZnS Thin Film Prepared by CO2 Laser Deposition Technique
...Show More Authors

In this work, ZnS thin films have been deposited by developed laser deposition technique on glass substrates at room temperature. After deposition process, the films were annealed at different temperatures (200ºC , 300 ºC and 400ºC ) using thermal furnace.The developed technique was used to obtain homogeneous thin films of ZnS depending on vaporization of this semiconductor material by continuous CO2 laser with a simple fan to ensure obtaining homogeneous films. ZnS thin films were annealed at temperature 200ºC, 300 ºC and 400ºC for (20) minute in vacuum environment. Optical properties of ZnS thin film such as absorbance, transmittance, reflectance, optical band gap, refractive index extinction coefficient and absorption coefficien

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
The Influence of Different Light Wavelengths on Growth, Enzymes Activity and Photosynthesis of the Marine Microalga Dunaliella parva W.Lerche 1937
...Show More Authors

Light is an important factor that influences the growth and photosynthetic efficiency of microalgae; however, little is known about how light intensity together with the wavelength affect the photosynthetic capacity and growth of marine microalgae. In the present study, the growth of the marine green microalga Dunaliella parva was studied and optimized under different light intensities (25 ~ 70 μmol m-2 s-1) and qualities (blue, green, and red) in comparison with white light at 40 μmol m-2 s-1 as a control. The growth was monitored by counting the cell number, pigment content, Chl a, Chl b, and carotenoids concentrations. The optimal growth and highest photosyntheti

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Al-khwarizmi Engineering Journal
The Influence of Support Materials on The Photo-Fenton-like Degradation of Azo Dye Using Continuous Nanoparticles Fixed-bed Column
...Show More Authors

This study used a continuous photo-Fenton-like method to remediate textile effluent containing azo dyes especially direct blue 15 dye (DB15). A Eucalyptus leaf extract was used to create iron/copper nanoparticles supported on bentonite for use as catalysts (E@B-Fe/Cu-NPs). Two fixed-bed configurations were studied and compared. The first one involved mixing granular bentonite with E@B-Fe/Cu-NPs (GB- E@B-Fe/Cu-NPs), and the other examined the mixing of E@B-Fe/Cu-NPs with glass beads (glass beads-E@B-Fe/Cu-NPs) and filled to the fixed-bed column. Scanning electron microscopy (SEM), zeta potential, and atomic forces spectroscopy (AFM) techniques were used to characterize the obtained particles (NPs). The effect of flow rate and DB15 concent

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref