Each school of Islamic jurisprudence has principles and rules upon which the diligent work in these schools is based. This is due to the view of sanctification of these rulings, as they are divine rulings. Therefore, the goal is to reach a ruling that represents the intent of the legislator as much as possible.
Hence, these schools of thought established rules for issuing fatwas with the intention of restricting the performance of a fatwa to the hands of those who are qualified for it and have met its conditions, so they gave priority to the most knowledgeable person over others to perform the fatwa. In the Hanafi school of thought, for example, the saying of Imam Abu Hanifa (may God have mercy on him) is given precedence over others, and when there is no saying of his, the saying of his student Abu Hanifa is given precedence. Yusuf, then the saying of Muhammad, then the saying of Zafar and Al-Hasan, and so on according to the aforementioned rule of prioritizing the most knowledgeable person over others, based on what is the principle in the rule of issuing fatwas. However, an exception may be made from this principle, prioritizing some of the sayings of someone who is preceded by someone who is more knowledgeable than him due to considerations that require this priority, such as interest, custom, and others. .
Hence, some of Zafar’s sayings were presented on the condition that they be the fatwa-based sayings in the Hanafi school of thought because they are more appropriate to the position, more beneficial to the people, and more beneficial in adopting them.
These issues were chosen for fatwa, some of them brought them to seventeen issues, or less or more, but the investigating Sheikh Ibn Abidin (may God have mercy on him) verified their number and brought them to twenty issues after dropping three issues, which were the property claim, the testimony of the blind person, and the will for a third of the money. The fatwa on it is different. Say exhale.
These twenty issues were organized by Ibn Abidin in his commentary (Returning the Confused to Al-Durr Al-Mukhtar) in (Chapter on Alimony) in verses that I explained and explained the jurisprudential issues in them and presented their rulings, in addition to what I have quoted here in terms of an explanation of one of the issues of this group from the book of Sheikh Muhammad Muhyi. Al-Din Abdul Hamid (Personal status in Islamic law).
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MorePhotonic Crystal Fiber Interferometers (PCFIs) are widely used for sensing applications. This work presents the fabrication and study the characterization of a relative humidity sensor based on a polymer-infiltrated photonic crystal fiber that operates in a Mach- Zehnder Interferometer (MZI) reflection mode. The fabrication of the sensor only involves splicing and cleaving Photonic Crystal Fiber (PCF) with Single Mode Fiber (SMF). A stub of (LMA-10) PCF spliced to SMF (Corning-28). In the splice regions. The PCFI sensor operation based on the adsorption and desorption of water vapour at the silica-air interface within the PCF. The sensor shows a high sensitivity to RH variations from (27% RH - 95% RH), with a change in its reflected powe
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe life insurance companies need a sound system to use it in selecting Insurable risks so they can avoid or reduce possible losses that may be insured to a minimum levels , But the application within IRAQI INSURANCE COMPANY reflects that it still depends on a traditional ways in the procedures used to select that risks .
This research represents an attempt to put acceptable suggestions about developing a system for selecting insurable risks which used now by iraqi insurance company by recognizing the risks of life insurance , determining kinds of risks which can difined as normal and upnormal risks , rectification of the
... Show MoreObjective: To determine the effectiveness of an Intervention Oriented program on the prognosis of Osteopenia among Women at Private clinics in Baghdad City. Methodology: A longitudinal design. A purposive ''non probability'' sample of (25) Women who have bone mineral density (BMD) T- test between (-1 to -2.5). The data are collected through the utilization of a constructed questionnaire and by means of interview with each client who is involved in the study. Each interview takes approximately (20) minutes. Results: The study showed that there is a good improvement in bone density accord after applicatio
Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreIn the present study, MIG welding is carried out on low carbon steel type (AISI 1015) by using electrode ER308L of 1.5mm diameter with direct current straight polarity (DCSP). The joint geometry is of a single V-butt joint with one pass welding stroke for different plate thicknesses of 6, 8, and 10 mm. In welding experiments, AISI 1015 plates with dimensions of 200×100mm and edge angle of 60o from both sides are utilized. In this work, three main parameters related to MIG welding process are investigated, which are welding current, welding speed, heat input and plate thickness, and to achieve that three groups of plates are employed each one consists of three plates. The results indicate that increasing the weld heat input (t
... Show MoreBackground: Mental health of children has recently been
receiving increased attention in many parts of the world.
However, such attention has been lacking in developing
countries, particularly in the form of systematic research
Aim: The study aimed to find out the frequency of
behavior disorders in a sample of primary school children
and the different social and demographic factors that might
be related to this disorder.
Methods: The study is a cross-sectional one that included
918 primary school pupils in both urban and rural areas of
Baghdad. Rutter's questionnaire teacher's version was used
to assess the pupils, and the demographic data was obtained
by special questionnaire sent to the parents to be
يلعب القطاع الصناعي التحويلي في أي قطر دوراً هاماً في تحقيق التنمية الصناعية، اذ تتحد تاثيراته فيها على طبيعة الدور المرسوم له وعلى مدى فاعلية هذا القطاع الحيوي الذي يعد اتجاه نحو التعاظم المضطرد لمستويات الانتاجية " Levels of productivity"والتنويع الانتاجي والتدفق المستمر للتجديد التكنولوجي من اهم دلائله.
ويعد مؤشر الانتاجية بصفة عامة وانتاجيتي العمل وراس المال بصفة خاصة من الم
... Show MoreThe subject of marketing culture and mental image is one of the important topics in the field of management. There is no study that combines these two variables. The research is important because of the increasing importance of the subject. The future direction of the company in question will support the company's economic and marketing responsibilities. And reflect the company's mental image, as a culture that contributes to changing the reality of the organization investigated by polling the views of a sample of managers in the General Company for Vegetable Oil Industry, which (30) out of the (65) individual, and There are two hypotheses of research: There is a significant
... Show More