Jurisprudence is one of the most honorable sciences in value, and the greatest of them in reward. Through it, the rulings of religion are known. He, may God’s prayers and peace be upon him, said: ((Whoever God desires good, He gives him understanding of religion)), and through it, the legal rulings and what is related to them are known from what is permissible and forbidden.
And prayer is the believer’s ascent to his Lord, with which the heart is at peace and the soul is at ease. If he, may God’s prayers and peace be upon him, was overwhelmed by an issue or something became difficult for him, he would panic in prayer and be reassured by it. It was necessary for the students of knowledge to investigate its aspects and its secrets, and to delve into the depths of its secrets, because it lives with the Muslim, young, young and old...
And I saw that I chose this title because I found that this subject abounded in sayings that ranged between strict and lenient.
Controversy abounded over a fatwa permitting the performance of prayers three times a day under the pretext of modern necessities, and they opened the door wide without a legal control.
In this field, men of Islamic thought were tolerant, such as Professor Jamal Al-Banna, who considered gathering as one of the necessities of the age, and he attributed that to the conditions that countries go through due to the busyness of times and work.
The jurists of our time were strict in this field, so they closed the door and locked it without looking at the legal texts that have flexibility for specific cases.
This research came to review the opinions of all the schools, and I discussed the evidence and showed the correct from the weak, then the more correct from the sayings.
This is one of the fruits of our effort that we present to our brothers so that they may stand upon the greatness of Islam and its validity for every time and place, and know the ease of this religion, and that he, may God’s prayers and peace be upon him, has been sent with the tolerant Hanafiyyah that only the doomed depart from it.
Recommender Systems are tools to understand the huge amount of data available in the internet world. Collaborative filtering (CF) is one of the most knowledge discovery methods used positively in recommendation system. Memory collaborative filtering emphasizes on using facts about present users to predict new things for the target user. Similarity measures are the core operations in collaborative filtering and the prediction accuracy is mostly dependent on similarity calculations. In this study, a combination of weighted parameters and traditional similarity measures are conducted to calculate relationship among users over Movie Lens data set rating matrix. The advantages and disadvantages of each measure are spotted. From the study, a n
... Show MoreBackground: Odontogenisis is a complex process controlled by dynamic and reciprocal interactions that regulated by various molecules. Thymosin β4 is a small bioactive peptide with wide spectrum biological effects on much cell types. The present study was designed to highlight the effect of synthetic exogenous Tβ4 on developing dental tissue of the upper central teeth of rats, by histological examination and immunohistochemical evaluation of TGFβ1. Materials and method: Thirty six Albino Wister pregnant rat 18control group received intraperitoneal injection of normal saline and the others are experimental group received 50µg/300µl of Tβ4 injection. The animals were sacrificed at periods 16th and 18th day I.U.L and one day p
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreA freshwater bivalve plays a crucial function in aquatic habitats as the filtered water and burrowing mussels mix the sediment, thus increasing oxygen content and making the ecosystem healthier. The aim of the study is to see how chlorpyrifos affects biochemical markers in freshwater mussel Unio tigridis. About 180 individuals per taxon and water samples were collected from the Qandil water resource on the Greater Zab River, Erbil Province, Iraq. Once arrived at the lab, the individuals were kept in aquaria with river water and an air-conditioned room Temperature: 25±2 and Light: 12h/12h and acclimatized to laboratory conditions for seven days in aged tap water. The mussel's identification molecularly and the DNA sequence of t
... Show MoreAdministrative procedures in various organizations produce numerous crucial records and data. These
records and data are also used in other processes like customer relationship management and accounting
operations.It is incredibly challenging to use and extract valuable and meaningful information from these data
and records because they are frequently enormous and continuously growing in size and complexity.Data
mining is the act of sorting through large data sets to find patterns and relationships that might aid in the data
analysis process of resolving business issues. Using data mining techniques, enterprises can forecast future
trends and make better business decisions.The Apriori algorithm has bee
The research aimed to identify the extent to which the media offices in the ministries depend on the website of the Iraqi Council of Ministers as a source of information. Such goal includes a set of sub-goals: Knowing the reasons for media offices' reliance on the information provided by the Cabinet's website; and revealing the benefit derived from relying on the Cabinet's website.
The researcher used the survey method to screen and comprehend the extent to which the media offices in the ministries depend on the website of the Iraqi Council of Ministers as a source of information.
The mechanism of comprehensive account of the limits of research wa
... Show MoreData-driven models perform poorly on part-of-speech tagging problems with the square Hmong language, a low-resource corpus. This paper designs a weight evaluation function to reduce the influence of unknown words. It proposes an improved harmony search algorithm utilizing the roulette and local evaluation strategies for handling the square Hmong part-of-speech tagging problem. The experiment shows that the average accuracy of the proposed model is 6%, 8% more than HMM and BiLSTM-CRF models, respectively. Meanwhile, the average F1 of the proposed model is also 6%, 3% more than HMM and BiLSTM-CRF models, respectively.