Preferred Language
Articles
/
jcois-286
Balance and moderation in dealing with the oppressor and the oppressed in the Sunnah - "Applied models")
...Show More Authors

Research Summary

In The Name of Allah Most Gracious Most Merciful

The word injustice and its derivatives were repeated in the Holy Qur’an in several places, approximately (154) times. This is due to the severity of its danger, and that the most dangerous thing that our Islamic nation suffers from in our time is; It is injustice in all its forms and types, so we should all have an honest review of the sincere change in the right direction, and uncover cases of injustice and explain their causes and causes, and work to treat them and rid the wrongdoers of their injustice, and help them to correct their condition. To reveal their grievances and explain their causes and causes, and work to remedy them, and support them and mitigate what they are in, and I will focus in this research on the injustice that occurs among the servants themselves; This is because it is very common in our time, and it is underestimated by the wrongdoers. From here, I chose this title, in which I will pause on the purified hadiths of the Prophet, and how they dealt with the oppressors and the oppressed, and how they dealt with this issue, and the research on this topic may be long, but I will stand on important vocabulary for this topic, and we will open a window on such important matters In a place, my description - the oppressor and the oppressed - are inseparable, so there is no oppressor without the oppressed, nor the oppressed without the oppressor, and I divided my research into two topics; The first is in: The Prophet’s method in dealing with injustice and oppressors. It began by defining injustice in language and idiomatically. I divided it into two requirements; The first: immunizing people from falling into injustice. The second: the prophetic treatment in dealing with injustice in the event of its occurrence. And I divided it into two parts: the first: the etiquette of dialogue with the oppressors, and the second: helping the oppressors to get rid of their oppression. As for the second topic, it was about: the prophetic method in dealing with the oppressed. I started it by defining the oppressed linguistically and idiomatically, and divided the topic into two requirements: the first: protecting people from falling into grievances before they happen. The second: Dealing with the purified Sunnah with the victim after it occurred.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 27 2020
Journal Name
Iraqi Journal Of Science
Green Synthesis and the Study of Some Physical Properties of MgO Nanoparticles and Their Antibacterial Activity
...Show More Authors

     Magnesium oxide nanoparticles (MgO NPs) were synthesized by a green method using the peels of Persimmon extract as the reducing agent , magnesium nitrate, and NaOH. This method is eco-friendly and non-toxic. In this study, an ultrasound device was used to reduce the particle size, with the impact on the energy gap was set at the beginning at 5.39 eV and then turned to 4.10 eV. The morphological analysis using atomic force microscopy (AFM)  showed that the grain size for MgO NPs was 67.70 nm which became 42.33 nm after the use of the ultrasound. The shape of the particles was almost spherical and became cylindrical.  In addition the Field-Emission Scanning Electron Microscopy (FESEM) analysis sh

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (19)
Scopus Crossref
Publication Date
Tue Feb 12 2019
Journal Name
Iraqi Journal Of Physics
Structural, electrical and optical properties of CdS thin films and the effect of annealing on photoconductivity
...Show More Authors

Cadmium sulfide (CdS) thin films with n-type semiconductor characteristics were prepared by flash evaporating method on glass substrates. Some films were annealed at 250 oC for 1hr in air. The thicknesses of the films was estimated to be 0.5µ by the spectrometer measurement. Structural, morphological, electrical, optical and photoconductivity properties of CdS films have been investigated by X-ray diffraction, AFM, the Hall effect, optical transmittance spectra and photoconductivity analysis, respectively. X-ray diffraction (XRD) pattern shows that CdS films are in the stable hexagonal crystalline structure. Using Debye Scherrerś formula, the average grain size for the samples was found to be 26 nm. The transmittance of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2009
Journal Name
Iraqi Journal Of Physics
Crystal Growth of Semiconductor CuAl0.4Ti0.6Se2 and studding the Structural Properties of its Alloy and Thin Film
...Show More Authors

Tetragonal compound CuAl0.4Ti0.6Se2 semiconductor has been prepared by
melting the elementary elements of high purity in evacuated quartz tube under low
pressure 10-2 mbar and temperature 1100 oC about 24 hr. Single crystal has been
growth from this compound using slowly cooled average between (1-2) C/hr , also
thin films have been prepared using thermal evaporation technique and vacuum 10-6
mbar at room temperature .The structural properties have been studied for the powder
of compound of CuAl0.4Ti0.6Se2u using X-ray diffraction (XRD) . The structure of the
compound showed chalcopyrite structure with unite cell of right tetragonal and
dimensions of a=11.1776 Ao ,c=5.5888 Ao .The structure of thin films showed

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 08 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Effect of Temperature and Nickel Concentration on the Electrical and Dielectric Properties of Polyethylene-Nickel Composites
...Show More Authors

The effect of temperature range from 298 K to 348 K and volume filler content ф on electrical properties of polyethylene PE filled with nickel Ni powders has been investigated. The volume electrical resistivity V  of such composites decreases suddenly by several orders of magnitude at a critical volume concentration (i.e. фc=14.27 Vol.%) ,whereas the dielectric constant   and the A.C electrical conductivity AC  of such composites increase suddenly at a critical volume concentration (i.e. фc=14.27 Vol.%).For volume filler content lower than percolation threshold ф<фc the resistivity decreases with increasing temperature, whereas the dielectric constant and the A.C electrical conductivity of

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 29 2019
Journal Name
Iraqi Journal Of Physics
A comparison study of the Structural and magnetic properties of pure Ni metal and NiZnMn ferrite
...Show More Authors

The magnetic properties of a pure Nickel metal and Nickel-Zinc-Manganese ferrites having the chemical formula Ni0.1(Zn0.4Mn0.6)0.9Fe2O4 were studied. The phase formation and crystal structure was studied by using x-ray diffraction which confirmed the formation of pure single spinel cubic phase with space group (Fd3m) in the ferrite. The samples microstructure was studied with scanning electron microstructure and EDX. The magnetic properties of the ferrite and nickel metal were characterized by using a laboratory setup with a magnetic field in the range from 0-500 G. The ferrite showed perfect soft spinel phase behavior while the nickel sample showed higher magnetic loss an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Aug 01 2021
Journal Name
Journal Of Engineering
Practical comparation of the accuracy and speed of YOLO, SSD and Faster RCNN for drone detection
...Show More Authors

Convolutional Neural Networks (CNN) have high performance in the fields of object recognition and classification. The strength of CNNs comes from the fact that they are able to extract information from raw-pixel content and learn features automatically. Feature extraction and classification algorithms can be either hand-crafted or Deep Learning (DL) based. DL detection approaches can be either two stages (region proposal approaches) detector or a single stage (non-region proposal approach) detector. Region proposal-based techniques include R-CNN, Fast RCNN, and Faster RCNN. Non-region proposal-based techniques include Single Shot Detector (SSD) and You Only Look Once (YOLO). We are going to compare the speed and accuracy of Faster RCNN,

... Show More
View Publication Preview PDF
Crossref (13)
Crossref
Publication Date
Fri Apr 23 2021
Journal Name
International Journal Of Environmental Analytical Chemistry
Removal of levofloxacin and ciprofloxacin from aqueous solutions and an economic evaluation using the electrocoagulation process‏
...Show More Authors

For this research, the utilisation of electrocoagulation (EC) toremove theciprofloxacin (CIP) and levofloxacin (LVX) from aqueous solutions was examined. The effective removal efficiencies are 93.47% for CIP and 88.00% for LVX, under optimum conditions. The adsorption isotherm models with suitable mechanisms were applied to determine the elimination of CIP and LVX utilizingtheEC method. Thefindingsshowed the adsorption of CIP and LVX on iron hydroxide flocs followed the Sips isotherm, with correlation coefficient values (R2) of 0.939 and 0.937. Threekinetic models were reviewed to determine the accurate CIP and LVX elimination methods using the EC method. The results showed that itfittedfor the second-order model, which indicated that the c

... Show More
Scopus (32)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Thu Aug 01 2024
Journal Name
Egyptian Journal Of Aquatic Biology And Fisheries
Climate Changes and Their Impact on Phytoplankton and Physicochemical Properties of the Tigris River, Baghdad, Iraq
...Show More Authors

The study was conducted in the Tigris River in Baghdad during May 2021 until March 2022 to follow the impact of climate change, rising temperatures, and the presence of pollutants on the dynamics of phytoplankton and some physicochemical variables from four sites. The results showed that the climatic conditions during different seasons, in addition to the nature of the sampling sites, have a clear and significant impact on the studied traits and, in turn, affect the phytoplankton community. The highest average temperature (30.67 ˚C) was recorded; the pH values ranged between 8.70 & 6.75; the electrical conductivity (1208.18-770.11 µS/cm ) and the total dissolved solids (TDS) (778.95- 439.49 mg/L) were evaluated. Upon measuring

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of The College Of Languages (jcl)
A study of the phonetic changes of Arabic loanwords in Balochi: بررسی تغییرات آوایی وام واژه های عربی در زبان بلوچی
...Show More Authors

 Abstract  Lanɡauaɡes, like humans, need communication and interaction to prosper. One of the ways for a language to flourish is to borrow words from other languages. The southern regions of Iran and the coastal countries of Persian Gulf have had strong cultural relations since old times, with language being a dimension of these relations. With their land being geographically located in the realm of Islamic civilization and being Muslims,  Baloch people have had strong connections with the Arab world and the Arabic language.Thus, many Arabic words have made their ways into Balochi language either directly or indirectly through persian language. Since each language has its own unique sound structure, these loanwords have undergone ph

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref