Jurisprudence is one of the most honorable sciences in value, and the greatest of them in reward. Through it, the rulings of religion are known. He, may God’s prayers and peace be upon him, said: ((Whoever God desires good, He gives him understanding of religion)), and through it, the legal rulings and what is related to them are known from what is permissible and forbidden.
And prayer is the believer’s ascent to his Lord, with which the heart is at peace and the soul is at ease. If he, may God’s prayers and peace be upon him, was overwhelmed by an issue or something became difficult for him, he would panic in prayer and be reassured by it. It was necessary for the students of knowledge to investigate its aspects and its secrets, and to delve into the depths of its secrets, because it lives with the Muslim, young, young and old...
And I saw that I chose this title because I found that this subject abounded in sayings that ranged between strict and lenient.
Controversy abounded over a fatwa permitting the performance of prayers three times a day under the pretext of modern necessities, and they opened the door wide without a legal control.
In this field, men of Islamic thought were tolerant, such as Professor Jamal Al-Banna, who considered gathering as one of the necessities of the age, and he attributed that to the conditions that countries go through due to the busyness of times and work.
The jurists of our time were strict in this field, so they closed the door and locked it without looking at the legal texts that have flexibility for specific cases.
This research came to review the opinions of all the schools, and I discussed the evidence and showed the correct from the weak, then the more correct from the sayings.
This is one of the fruits of our effort that we present to our brothers so that they may stand upon the greatness of Islam and its validity for every time and place, and know the ease of this religion, and that he, may God’s prayers and peace be upon him, has been sent with the tolerant Hanafiyyah that only the doomed depart from it.
This present study is aimed at deciding the impact of exercises adapted to the ranges of movements of the arm on the performance of javelin throwing. As long as javelin throwing is quite a complex athletic event that presupposes a considerable amount of strength, speed, and biomechanical accuracy, it is crucial to learn whether the exercises designed to target the peculiarities of arm movements can have a positive effect on the performance of javelin throwers. To the study, experimental research with a single group of six youth javelin throwers was carried out. Before and after the eight-week training program, the pre-tests and post-tests were conducted to find the results of training with a specific focus on resistance exercises. Significa
... Show MoreBackground: The need of the patient for a more reasonable esthetic orthodontic intervention has risen nowadays. Thus, orthodontists make use of esthetic orthodontic materials like brackets, ligature elastics, and arch wires. The esthetic brackets come as different forms of materials, such as ceramic brackets, which have their stainability remaining as the most important consideration for the patients and the orthodontists. This study aimed to compare the staining effects of various staining materials, including black tea, cigarette smoke and Pepsi, as well as the time effect on the color stability of sapphire ceramic brackets bonded with three kinds of light cure orthodontic adhesives: Transbond, Resilience and Enlight. Materials and Met
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreThis study involved the effect of the aqueous extracts of two plants, Origanum vulgare L.(1), Trigonella Foenum Graecum L. (Fenugreek) seeds(2) on the growth of cancer cell lines. Rhabdomyo sarcomas (RD) of human cell line and female intestine cells of Albino mice (L20B) in vitro System. These extracts were compared with the known anticancer drug Cis-platinum(Cis-Pt) as a positive control. The phytochemical tests were used for screening the active compounds in plants. The inhibition activity assay was used as a parameter of the cytotoxic effect of these extracts. Cancer cell lines were treated with four concentrations of Cis-platin, 31.25, 62.5, 125 and 250 ?g/ml for 72 hour exposure time. The same concentrations were used for the other ext
... Show MoreThe objective of this research is to develop a method for applying financial derivatives in the local environment to reduce the risk of foreign exchange rate fluctuations to enhance quality of accounting profits through Financial reporting to local units In accordance with international financial reporting standards, To accomplish this objective was selected a sample of Iraqi units exposed to the risk of fluctuations in foreign currency rates, As the research found:
- many companies and banks in the local environment a lot of losses due to fluctuations in foreign currency exchange rates.
- that financial derivatives in the Iraqi environment represent
The experiment was carried out to study the effect of variety and gibberellic acid in concentration (0 and 50)mg.lat-1 and BL in five concentration (0, 0.50 ,1 ,2 and 3)mg.ltr-1 and their interaction in some chemical Characteristics and total chlorophyll for Dill plant . the experiment designed according Randomized Complete Block Design (RCBD) and three replicates per treatment, compared to the average using less significant difference at the level of probability (0.05) , the results showed the following:- The effect of brassinolide with it,s concentrations led to obtain a significant increase in all the studied characteristics, so the superiority of the concentration of 2 mg.L-1 of brassinolide in each of Ca, Mg,Fe, and total chlorophyll T
... Show MoreThe present research is descriptive and analytical by nature; it practically presents the method of implementing the standard pattern in an unconventional way using the bias-cut line. The study aims at investigating the variables of bias-cut and their suitability for fitting large-shaped Iraqi ladies. It also aims at exploring the artistic and innovative features of the bias-cut. Therefore, one needs to understand the rules and basics of clothing and the nature of the body to reach the maximum degree of control.Consequently, the study is to answer the following questions: What is the effectiveness of tailoring on the bias-cut in fitting a standard template of a large-shaped Iraqi ladies? Is it possible to obtain from the offered possibil
... Show MoreThis competition between competing forces, organized into axes with conflicting objectives, is reflected in all regional affairs and the goals and interests of countries within them, including Iraq. Among the most important aspects impacted by the repercussions of international and regional competition in the region is Iraqi national security, based on its vital importance in preserving the sovereignty and entity of the Iraqi state, protecting the interests and cohesion of the state and people, ensuring and defending their present and future, and interacting with various regional and international activities. The Kurdistan Region, as an important part of Iraq with its own unique characteristics, may be one of the most important regi
... Show MoreVideo copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and Arnold Map. The proposed method chooses only frames with maximum and minimum energy features to host the watermark. It also exploits the advantages of both the fast Walsh Hadamard transform (FWHT) and discrete wavelet transforms (DWT) for watermark embedding. The Arnold map encrypts watermarks before the embedding process and decrypts watermarks after extraction. The results show that the proposed method can achieve a fast embedding time, good transparency, and robustness against various
... Show More