Each school of Islamic jurisprudence has principles and rules upon which the diligent work in these schools is based. This is due to the view of sanctification of these rulings, as they are divine rulings. Therefore, the goal is to reach a ruling that represents the intent of the legislator as much as possible.
Hence, these schools of thought established rules for issuing fatwas with the intention of restricting the performance of a fatwa to the hands of those who are qualified for it and have met its conditions, so they gave priority to the most knowledgeable person over others to perform the fatwa. In the Hanafi school of thought, for example, the saying of Imam Abu Hanifa (may God have mercy on him) is given precedence over others, and when there is no saying of his, the saying of his student Abu Hanifa is given precedence. Yusuf, then the saying of Muhammad, then the saying of Zafar and Al-Hasan, and so on according to the aforementioned rule of prioritizing the most knowledgeable person over others, based on what is the principle in the rule of issuing fatwas. However, an exception may be made from this principle, prioritizing some of the sayings of someone who is preceded by someone who is more knowledgeable than him due to considerations that require this priority, such as interest, custom, and others. .
Hence, some of Zafar’s sayings were presented on the condition that they be the fatwa-based sayings in the Hanafi school of thought because they are more appropriate to the position, more beneficial to the people, and more beneficial in adopting them.
These issues were chosen for fatwa, some of them brought them to seventeen issues, or less or more, but the investigating Sheikh Ibn Abidin (may God have mercy on him) verified their number and brought them to twenty issues after dropping three issues, which were the property claim, the testimony of the blind person, and the will for a third of the money. The fatwa on it is different. Say exhale.
These twenty issues were organized by Ibn Abidin in his commentary (Returning the Confused to Al-Durr Al-Mukhtar) in (Chapter on Alimony) in verses that I explained and explained the jurisprudential issues in them and presented their rulings, in addition to what I have quoted here in terms of an explanation of one of the issues of this group from the book of Sheikh Muhammad Muhyi. Al-Din Abdul Hamid (Personal status in Islamic law).
The research problem can be summarized through focusing on the environment that surrounds students and class congestion, how these factors affect directly or indirectly the academic achievement of students, how these factors affect understanding the scientific material that the student receives in this physical environment, how classroom’s components such as seats, space With which the student can move, the number of students in the same class, the lighting, whether natural or artificial, and is this lighting sufficient or not enough, the nature of the wall paint old or modern, is it comfortable for sight, the blackboard if it is Good or exhausted, In addition to air-conditioning sets in summer and winter, this is on the on
... Show MoreThe idea of the design of combination Between split – plot and split block means that an experiment conducted with a design
formed by combination Between split – plot and split block, and it presents a precise manner to analytic who aimed to make appropriate statistical analysis for the experiment because such design contains four random errors , it make a high precision rather than another designs. The plan and the theoretical analysis were presented with application to show its idia and the ability to use it in many fields especially in agricultural experiments field .
The cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
The issue of dignity is one of the topics that do not pass as long as the earths and the heavens remain; Because the earth is not devoid of the righteous, the believers, the saints, and the pious, and these do not cease from them aid, dignity, insight, or good vision, and from here the authorship in this section was continuous; Because the people’s need for it is confirmed as time progresses, and in that, Ibn Taymiyyah says in the sum of his fatwas, “And from what it should be known is that dignities may be according to the man’s need, so if the weak needs them Faith or the needy, he is given from it what strengthens his faith and fulfills his needs, and he who is more complete is the guardianship of God than him. He is independent
... Show MoreThe city of Ghana is one of the important commercial cities in the country of Sudan, as it was a major source of commercial exchanges, and a commercial mediator across the countries of the Maghreb and the metropolises of the countries of Sudan. Many, and most of them take the desert road, Which traders had to endure the hardships of these roads from the insecurity, high winds and dust that sometimes destroyed the trade convoys, in order to obtain gold, which is one of the most important minerals that Ghana traded with various countries, in addition to the different goods that the merchants carried In particular, salt and its trade with Ghana, and also taxes, which were an important financial resource imposed by some gov
... Show MoreThe current study aimed at identifying the impact of each of the full and part time summer enrichment programs on the performance of gifted students. Moreover, it aimed to study the difference between the full and part time programs on the performance of gifted students. The study sample consisted of (115) students from the full time programs and (137) students from the part time programs, they have been randomly selected from the gifted students participating in the full and part time summer enrichment programs. The researcher used the scale of student performance. The results indicated that there were statistically significant differences between the averages of the pre and post applications of the
... Show MoreCloud computing is the new technological trend for future generations. It represents a new way to use IT resources more efficiently. Cloud computing is one of the most technological models for developing and exploiting infrastructure resources in the world. Under the cloud, the user no longer needs to look for major financing to purchase infrastructure equipment as companies, especially small and medium-sized ones, can get the equipment as a service, rather than buying it as a product. The idea of cloud computing dates back to the sixties of the last century, but this idea did not come into actual application until the beginning of the third millennium, at the hands of technology companies such as Apple, Hp, IBM, which had
... Show MoreThe current research aims to identify "the impact of the round table strategies and the question of self-achievement and self-efficacy among students of the Faculty of Education in research methodology course.” The research sample consisted of (75) male and female-third stage students in the department of Life Sciences / College of Education for Pure Sciences / University of Dhi Qar for the academic year (2018-2019. The researcher adopted the experimental approach to achieving the study objectives. The researcher prepared two tools: the achievement test and the self-efficacy scale were applied to the collected sample to obtain the needed data. The result showed that there was a statistically significant difference at the level (0.05) b
... Show More