God, may He be glorified and exalted be He, has given every human being the right to life and a dignified life, and has warned against transgression against any of its sanctities without a legitimate right. No one, regardless of his status or authority, can deprive a person of his rights that the Sharia came to preserve, and whoever does that has declared all people to war, as all humanity is in solidarity. In raising the hand that is simplified to harm a person and oppress him unjustly and exalted in the land.
If this is the case, the Sharia came to establish the right of people, groups and individuals, to defend their sanctities, preserve their security, recover their usurped rights, repel the aggression of the aggressors, and oppress the oppressors, even if that leads to shedding their blood and taking their lives. Religion, and the pillar of Sharia.
From this point of view, I preferred that my research be about the human right to defend himself, his sanctity, his money, and his religion, so it was under the title (The ruling on the human right to defend himself and his sanctities in Islamic jurisprudence). Introducing Al-Sail and explaining its provisions, and accordingly, it will be in the form of two topics, then issues and branches will branch out from it.
tA novel synthesis procedure is presented for preparing triethanolamine-treated graphene nanoplatelets(TEA-GNPs) with different specific areas (SSAs). Using ultrasonication, the covalently functionalizedTEA-GNPs with different weight concentrations and SSAs were dispersed in distilled water to prepareTEA-GNPs nanofluids. A simple direct coupling of GNPs with TEA molecules is implemented to synthesizestable water-based nanofluids. The effectiveness of the functionalization procedure was validated by thecharacterization and morphology tests, i.e., FTIR, Raman spectroscopy, EDS, and TEM. Thermal conduc-tivity, dispersion stability, and rheological properties were investigated. Using UV–vis spectrometer, ahighest dispersion stability of 0.876
... Show MoreThis research aims to find out the extent the reflection of tacit knowledge dimensions (experience, skill, intuition, the ability to think) on Organizational performance of the offices of inspectors general dimensions (internal processes, growth and learning the focus, the focus on the customer) and the measurement and analysis of the type of impact the tacit knowledge of auditors on performance Organizational in inspectors general offices, the research seeks to diagnose the extent of awareness of Office Management knowledge implicit and the attention span of the administration in determining levels and performance levels, and the resolution means the main information-gathering adopted by the researcher, which, as well as his exp
... Show MoreDenture bases are fabricated routinely using Poly(methyl methacrylate) (PMMA) acrylic resin. Yet, it is commonly known for its major drawbacks such as insufficient strength and ductility. The purpose of this study was to improve the performance of PMMA acrylic resin as a denture base material by reinforcement with surface treated lithium disilicate glass ceramic powder. The ceramic powder was prepared by grinding and sieving IPS e.max CAD MT blocks. Then, the powder was surface treated with an organosilane coupling agent (TMSPM) and added to PMMA in amount of 1%, 3%, 5% and 7% by weight. Characterizations of the powder was done by particle size analysis, XRD and FTIR. Transverse strength, Impact strength, Shore D hardness and surface roughn
... Show MoreThe paper is concerned with the state and proof of the existence theorem of a unique solution (state vector) of couple nonlinear hyperbolic equations (CNLHEQS) via the Galerkin method (GM) with the Aubin theorem. When the continuous classical boundary control vector (CCBCV) is known, the theorem of existence a CCBOCV with equality and inequality state vector constraints (EIESVC) is stated and proved, the existence theorem of a unique solution of the adjoint couple equations (ADCEQS) associated with the state equations is studied. The Frcéhet derivative derivation of the "Hamiltonian" is obtained. Finally the necessary theorem (necessary conditions "NCs") and the sufficient theorem (sufficient conditions" SCs") for optimality of the stat
... Show MoreThis study was conducted in the poultry field of the College of Agricultural Engineering Sciences / University of Baghdad for the period from 10/15/2021 to 11/25/2021 in order to show the effect of adding different levels of Ganoderma lucidum to broiler diets on physiological traits and indicators of fat oxidation in meat. In it, 200 unsexed (Ross 308) chicks of one-day-old breed were used, with a starting weight of (40) g. The chicks were distributed and randomly divided into four treatments, with 50 birds for each treatment. One treatment included five replicates (10 birds/repeat) and the experiment treatments were T1, T2, T3, and T4. The percentages of adding reishi mushrooms were 0, 0.5, 1, and 1.5 g/kg of feed, respectively. Th
... Show MorePrecise forecasting of pore pressures is crucial for efficiently planning and drilling oil and gas wells. It reduces expenses and saves time while preventing drilling complications. Since direct measurement of pore pressure in wellbores is costly and time-intensive, the ability to estimate it using empirical or machine learning models is beneficial. The present study aims to predict pore pressure using artificial neural network. The building and testing of artificial neural network are based on the data from five oil fields and several formations. The artificial neural network model is built using a measured dataset consisting of 77 data points of Pore pressure obtained from the modular formation dynamics tester. The input variables
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show More