This large book represents the research and is marked (Compilers of Hanbali jurisprudence of the Abbasid era). It includes, between its covers, a large group of scholars of the Islamic nation, with its great jurists and mujtahids, from the followers of the school of (Ahmed bin Hanbal) in the fundamentals and branches, and specific to the sciences of the Qur’an, its jurisprudence, and the narrators of the hadiths of the Noble Prophet The best of creation (Muhammad) peace and blessings be upon him, and it also includes a large number of reciters and ascetics, who are known for their abundance of authorship, especially with regard to the collection and numbers of classifications, and they are too large to be counted by number! But can we confine them to the time period? Nearly two and a half centuries, starting from the beginning of the fourth century AH, which is considered in the eyes of researchers, is the most fertile period that all sciences went through, including Islamic and jurisprudential sciences, and what followed until the year (656 AH), which is the date on which the light of Baghdad entered ( Treasures of science and knowledge) at a time when Europe was going through a stage of complete darkness in what is called the Middle Ages, and for this there is no wonder. If the Islamic State and its capital, Baghdad, became a haven for scholars, jurisprudence and scholars from all over the world, which made it an almost (continuous) target for all the evil hordes from the East and the West..
And if Baghdad fell at the hands of the Tatars in (656 AH), when the occupiers tried to cut the necks of its scholars, and threw its civilizational history towards the Tigris, which made its water mix with the inks of books and their scientific and jurisprudential blogs.
The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech
... Show MoreIn the present work, a d.c. magnetron sputtering system was designed and fabricated. The chamber of this system was includes from two copper coaxial cylinders where the inner one used as a cathode (target) while the outer one used as the anode with Solenoid magnetic coil located on the outer cylinder (anode). The axial profile of magnetic field for various coil current (from 2A to 14 A) are shown. The plasma characteristics in the normal glow discharge region are diagnostics by the 2.2mm diameter Langmuir probe with different length along the cathode and located at different radial positions 1cm and 2cm from the cathode surface. The result of this work shows that, the electron energy distributions at different radial positions along the
... Show MoreQuantum calculations on the most stable structure were carried
out for calculating the electronic properties, energies and the charge
density at the Carbon and Hydrogen atoms by Semi-empirical
method (PM3) of zigzag carbon nano tube CNT (9,0) (SWCNTs), at
the equilibrium geometry depending on the pictures of Zigzag
CNT(9,0) which was found to has D3d symmetry point group by
applying for (Gaussian 2003) program. In this work the results
include calculation the relation for axial bonds length, which are the
vertical C-C bonds (annular bonds) in the rings and bonds length
which are in the outer ring that called the circumferential bonds. Also
include a different kind of vibration modes like breathing, puckering
Many organizations today are interesting to implementing lean manufacturing principles that should enable them to eliminating the wastes to reducing a manufacturing lead time. This paper concentrates on increasing the competitive level of the company in globalization markets and improving of the productivity by reducing the manufacturing lead time. This will be by using the main tool of lean manufacturing which is value stream mapping (VSM) to identifying all the activities of manufacturing process (value and non-value added activities) to reducing elimination of wastes (non-value added activities) by converting a manufacturing system to pull instead of push by applying some of pull system strategies a
... Show MoreFour new species of Thrips (Thripidae) Chirothrips imperatus sp. nov.; Frankliniella megacephala sp. nov.; Retithrips bagdadensis sp. nov; Taeniothrips tigridis sp. Nov.; from middle of Iraq, are described and illustrated with their hosts.
Kinetic and mechanism studies of the oxidation of oxalic acid by Cerium sulphate have been carried out in acid medium sulphuric acid. The uv- vis. Spectrophotometric technique was used to follow up the reaction and the selected wavelength to be followed was 320 nm. The kinetic study showed that the order of reaction is first order in Ce(IV) and fractional in oxalic acid. The effect of using different concentration of sulphuric acid on the rate of the reaction has been studied a and it was found that the rate decreased with increasing the acid concentration. Classical organic tests was used to identify the product of the oxidation reaction, the product was just bubbles of CO2.