Research Summary
The research revolves around the collection of pending hadiths on Abdullah bin Amr bin Al-Aas, may God be pleased with them, and it is required in these hadiths that they be among those in which there is no room for diligence, such as telling about unseen matters, signs of the Hour, or a statement of virtue and reward for obedience, or punishment for disobedience.
The research consists of an introduction, two topics, and a conclusion of the first topic in the translation of Abdullah bin Amr bin Al-Aas, and the second topic, the pending hadiths of Abdullah bin Amr bin Al-Aas, may God be pleased with them, in which there is no room for diligence in collecting and studying
At the end of this research, I have reached the following results: The importance of studying the reports reported on the Companions, may God be pleased with them, in order to distinguish the correct ones from the weak ones. I came across twenty pending narrations on Abdullah bin Amr bin Al-Aas, may God be pleased with them, six of which are authentic, two are good, and twelve are weak.
This article discusses some of the metaphorical use of language units. Here we will define the basic concepts and underline the causes of this phenomenon. Through research it is proven that through the application of names of some body parts achieves the variety of metaphorical meanings.
Although severe epistaxis is uncommon, it is serious. The systematic endoscopic nasal examination is an essential step in identifying the bleeding point and aiding electrocauterization. Currently, the S-point, which is located in the superior part of the nasal septum behind the septal body and corresponding to the axilla of the middle concha, is identified in about 30% of cases with severe epistaxis. Cauterization of this point has an excellent rate of controlling the bleeding and preventing its recurrence. We aimed to highlight the significance of the S-point in the management of severe cases of epistaxis.
Throughout this paper we study the properties of the composition operator
C
p1 o
p2 o…o
pn induced by the composition of finite numbers of special
automorphisms of U,
pi (z) i
i
p z
1 p z
Such that pi U, i 1, 2, …, n, and discuss the relation between the product of
finite numbers of automorphic composition operators on Hardy space H2 and some
classes of operators.
The semiconductor ZnO is one of II – VI compound group, it is prepare as thin films by using chemical spray pyrolysis technique; the films are deposited onto glass substrate at 450 °C by using aqueous zinc chloride as a spray solution of molar concentration 0.1 M/L. Sample of the prepared film is irradiating by Gamma ray using CS 137, other sample is annealed at 550°C. The structure of the irradiated and annealed films are analyzed with X-ray diffraction, the results show that the films are polycrystalline in nature with preferred (002) orientation. The general morphology of ZnO films are imaged by using the Atomic Force Microscope (AFM), it constructed from nanostructure with dimensions in order of 77 nm.
The optical properties o
Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos