Preferred Language
Articles
/
jcois-2213
Ruling on combining prayers without excuse when needed
...Show More Authors

Jurisprudence is one of the most honorable sciences in value, and the greatest of them in reward. Through it, the rulings of religion are known. He, may God’s prayers and peace be upon him, said: ((Whoever God desires good, He gives him understanding of religion)), and through it, the legal rulings and what is related to them are known from what is permissible and forbidden.
And prayer is the believer’s ascent to his Lord, with which the heart is at peace and the soul is at ease. If he, may God’s prayers and peace be upon him, was overwhelmed by an issue or something became difficult for him, he would panic in prayer and be reassured by it. It was necessary for the students of knowledge to investigate its aspects and its secrets, and to delve into the depths of its secrets, because it lives with the Muslim, young, young and old...
And I saw that I chose this title because I found that this subject abounded in sayings that ranged between strict and lenient.
Controversy abounded over a fatwa permitting the performance of prayers three times a day under the pretext of modern necessities, and they opened the door wide without a legal control.
In this field, men of Islamic thought were tolerant, such as Professor Jamal Al-Banna, who considered gathering as one of the necessities of the age, and he attributed that to the conditions that countries go through due to the busyness of times and work.
The jurists of our time were strict in this field, so they closed the door and locked it without looking at the legal texts that have flexibility for specific cases.
This research came to review the opinions of all the schools, and I discussed the evidence and showed the correct from the weak, then the more correct from the sayings.
This is one of the fruits of our effort that we present to our brothers so that they may stand upon the greatness of Islam and its validity for every time and place, and know the ease of this religion, and that he, may God’s prayers and peace be upon him, has been sent with the tolerant Hanafiyyah that only the doomed depart from it.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
On Min - Cs Modules and Some Related Concepts
...Show More Authors

Our aim in this paper is to study the relationships between min-cs modules and some other known generalizations of cs-modules such as ECS-modules, P-extending modules and n-extending modules. Also we introduce and study the relationships between direct sum of mic-cs modules and mc-injectivity.

View Publication Preview PDF
Crossref
Publication Date
Mon Dec 16 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The impact of information technology on tax evasion
...Show More Authors

The research aims at shedding light on the impact of information technology in reducing tax evasion in the General Authority for Taxation. In order to achieve this, the research relied on the analysis of its variables as a main tool for collecting data and information. The results showed that there is a positive and positive effect of information technology on tax evasion. The impact of information technology on increasing tax revenues and reducing the phenomenon of tax evasion In the performance of the research sample, the research sought to highlight the importance of tax information technology through its data and information to the tax administration for the purpose of completing the process Taxpayers for persons subject to income ta

... Show More
View Publication Preview PDF
Publication Date
Sun May 01 2016
Journal Name
Journal Of Pharmaceutical, Chemical And Biological Sciences
Review on: Vaginitis. A problem to be solved!!
...Show More Authors

Candida is the scientific name for yeast. It is a fungus that lives almost everywhere, including in human body. Usually, the immune system keeps yeast under control. If the individual is sick or taking antibiotics, it can multiply and cause an infection. Yeast infections affect different parts of the body in different ways including thrush is a yeast infection that causes white patches in oral cavity ,Candida esophagitis is thrush that spreads to esophagus, women can get vaginal yeast infections,(vaginitis) causing itchiness, pain and discharge, yeast infections of the skin cause itching and rashes ,yeast infections in bloodstream can be life-threatening . The current review article will concentrate on vaginal infection (vaginitis), project

... Show More
Publication Date
Fri Dec 30 2022
Journal Name
مجلة نسق
Islamic Sharia’s position on the phenomenon of bullying
...Show More Authors

The study was enriched by examining (Islamic Sharia’s position on the phenomenon of bullying) becausee bullying is a recurring aggressive behavior that Is one of the types of violence directed by a person or group of prsons; With the intent of deliberately harming and offending anotherr person or group of persons, It has several verbal, physical, electronIc or other formsforms Bullies may follow a policy of Ientimidation or intimidation, as well as ridicule; In order to belittle the victim .The study aims to know the Islamic Sharia ruling on bullying as a modern term for a content that Is as old as man, and the study reached several results, Including: Islam’s affirmation of the prohibition of this phenomenon In word, deed and gesture,

... Show More
Preview PDF
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On the Stability and Acceleration of Projection Algorithms
...Show More Authors

The focus of this paper is the presentation of a new type of mapping called projection Jungck zn- Suzuki generalized and also defining new algorithms of various types (one-step and two-step algorithms) (projection Jungck-normal N algorithm, projection Jungck-Picard algorithm, projection Jungck-Krasnoselskii algorithm, and projection Jungck-Thianwan algorithm). The convergence of these algorithms has been studied, and it was discovered that they all converge to a fixed point. Furthermore, using the previous three conditions for the lemma, we demonstrated that the difference between any two sequences is zero. These algorithms' stability was demonstrated using projection Jungck Suzuki generalized mapping. In contrast, the rate of convergenc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 30 2019
Journal Name
College Of Islamic Sciences
The effect of context on some Quranic methods
...Show More Authors

Each book has a specific style in which its author walks on it from its beginning to its end, and the Holy Qur’an is a book that compiled many methods that were indicative of its miracle, and that it is one unit even though it has been astrologer for twenty-three years.
There is no doubt that knowledge of the Qur’anic methods is one of the pillars of the approach that deals with any of the Qur’an, and the multiplicity of Qur’anic methods is a fact that has many causes. It has been expressed by the Qur’anic discharge and the conjugation of verses to bring them to different methods, and on multiple forms such as nominal, actual, singular Qur’an, presentation, delay, deletion, mention, abbreviation and redundancy. The Qur'ani

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image
...Show More Authors

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Physics: Conference Series
SOME RESULTS ON T_PURE SUBMODULES RELATED TO SUBMODULE
...Show More Authors
Abstract<p>The aim of this work is studying many concepts of a pure submodule related to sub-module L and introducing the two concepts, T_pure submodule related to submodule and the crossing property of T_pure related to submodule. Another characterizations and study some properties of this concept.</p>
View Publication
Scopus Crossref
Publication Date
Wed Apr 12 2017
Journal Name
Int'l Journal Of Computing, Communications & Instrumentation Engg.(ijccie)
Variant Parameters effect on OFDM Estimation Power Consumption
...Show More Authors