Praise be to God, Lord of the Worlds, and prayers and peace be upon our Master Muhammad and upon all his family and companions:
And then: What most concerns rational people and reformers in the modern era is the moral deviation and delinquency that dominates childhood, due to family disintegration and the lack of discipline of most societies according to the religious and moral motives called for by the heavenly messages, especially Islam, which is the final message and guarantees the reform of people in life. Every time and place.
Islam has drawn attention to this issue (childhood) and made it the focus of its consideration, considering that the child is the nucleus of society and the preparation for the future, so it ordered that he be raised, preserved, and his affairs managed, and that he live between his parents in harmony, love, and tenderness, and it took into account his condition in the absence of that harmony or separation for any reason. So the system was established that would guarantee and correct this situation, and it was the role of the jurists to clarify and detail what the Sharia ordered so that it would be within the reach of people, an effective treatment that would lead to the desired purpose, and would be a protective fence from the pests and temptations to which childhood might be exposed.
This research has highlighted the valuable efforts and diligences presented by the four imams for this issue, and God grants success to what is right and guides to the path of guidance.
In the name of Allah, the Beneficent, the Merciful.
Praise be to Allah, Lord of the Worlds and peace and blessings on the honest and trustworthy (Muhammad) and his family and his divine good companions.
The Islamic clothing is one of the requirements of the common and original innateness to humans; the innateness that is created by God to all people, Allah says, (So set thou thy face steadily and truly to the Faith: [establish] Allah's handiwork according to the pattern on which He has made mankind: no change [let there be] in the work [wrought] by Allah: that is the standard Religion: but most among mankind understand not) (1). Islam as a natural religion has ordered the Muslims to wear decently, Allah says, ( O Children of Adam!
This research was from an introduction, three topics and a conclusion, as follows:
The first topic: the concept of Islamic banks and their emergence and development, which includes three demands are:
The first requirement: the concept of Islamic banks and types, and there are two requirements:
* Definition of Islamic banks language and idiom.
* Types of Islamic banks.
The second requirement: the emergence and development of Islamic banks.
Third requirement: the importance of Islamic banks and their objectives.
We learned about the concept of banks and their origins and how they developed and what are the most important types of Islamic banks
The second topic: Formulas and sources of financing in Islamic banks and
The current paper proposes a new estimator for the linear regression model parameters under Big Data circumstances. From the diversity of Big Data variables comes many challenges that can be interesting to the researchers who try their best to find new and novel methods to estimate the parameters of linear regression model. Data has been collected by Central Statistical Organization IRAQ, and the child labor in Iraq has been chosen as data. Child labor is the most vital phenomena that both society and education are suffering from and it affects the future of our next generation. Two methods have been selected to estimate the parameter
... Show MoreThe aim of the study is to investigate the extent to which the teachers of Islamic education and their teachers taught the technological innovations in the universities and to test the significance of the differences between the averages of the degree of practice according to the variables: gender, experience, scientific qualification, and educational stage. To achieve these objectives, a questionnaire consisting of (20) (20) teacher and school, teachers of Islamic education in Iraqi universities.
The results indicated that the degree of the practice of Islamic education teachers and their teachers of technological innovations was moderate, and there were statistically significant differences in the variable of
... Show MoreBlockchain represents a new promising technology with a huge economic impact resulting from its uses in various fields such as digital currency and banking; malware represents a serious threat to users, and there are many differences in the effectiveness of antivirus software used to deal with the problem of malware. This chapter has developed a coefficient for measuring the effectiveness of antivirus software. This chapter evaluates the effectiveness of antivirus software by conducting tests on a group of protection programs using a folder containing an amount of data. These programs are applied to combat viruses contained in this folder. The study revealed that the effectiveness of antivirus software is as follows: AVG scored 0%,
... Show MoreCurrent search problem manifested and widows who community harsh to bear hardships and pains، The goals of continuing the sustainability of life and take responsibility, and especially in light of the difficult circumstances in which Iraq is going through, and the displacement of murder and terrorism, which generated huge numbers of widows and orphans Because of the loss of a breadwinner and which became women and children are the most harm to the victim and as a result of wars and armed tendencies So this research is an important and vital topic opens our horizons important for overlapping roles of women widows and their impact on the achievement and status of Iraqi women and that as long as aptly characterized and their ability to end
... Show Moreملخص البحث
يعد البيت المكان الاجتماعي الأول الذي تبنى فيه الصحة النفسية لدى الفرد منذ بداية حياته كطفل في ظل أسرته ، إلا أن الروضة تمتلك على الرغم من ذلك أثراً تكوينياً مهماٌ في حياة الطفل وعلى شخصيته ، والتي لا يمكن ان يقلُّ عن أثر الايجابي للبيت ؛ ذلك أن المفهوم الجديد لدور الروضة لا يقتصر بمجرد كونها مكانًا تقوم فيها المعلمة بتزويد الاطفال بالمعر
... Show MoreThis paper was aimed to evaluate the polyurethane (PU) and polyurethane/polyvinyl chloride (90 wt. % / 10 wt. %) as organic coating of carbon steel substrate against marine environment (3.5 wt.% NaCl aqueous solution) as a severe corrosion environment . The electrochemical impedance spectroscopy (EIS) and fitting impedance data by ZsimpWin 3.22 software were used to estimate the physical barrier of the samples for different exposure times. Different equivalent electrical circuits were proposed for the physical barrier at different immersion times to get appropriate fitting .Both PU and PU/PVC coatings showed excellent corrosion protection ability for steel .The PU/PVC coating showed better protection and stability than PU coating against
... Show MoreCloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v
... Show MoreThis paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos