Preferred Language
Articles
/
jcois-291
Violations of women to men in the jurisprudence of Hajj
...Show More Authors

In the name of of Allah the Merciful

 

Introduction:

Praise be to Allah, Lord of the Worlds, and prayers and peace be upon our master Muhammad and his family and companions.

After

I have looked at a part of the jurisprudence of Hajj jurisprudence, which is needed now, especially after it facilitated travel to perform Hajj and Umrah, so the need was an advocate and a list for writing in it, which is beneficial to Hajj, Umrah and the guide.

And this important part is the things that contravene the woman's man in the Hajj and after the search and tracking found that there are ten things that get the violation and therefore I will each one of them a clear article in which the difference and the most likely of the words.

I ask Allaah to help me in the statement of these things, and it has been divided into several topics:

The first topic: wearing sewn

The second topic: covering the head

The third topic: covering the face

The fourth topic: in raising the voice Baltalib

The fifth topic: in the shaving of the head or default

The sixth topic: wearing slippers

The seventh topic: In the sand in the tawaaf and in the proximity and distance from the house in the tawaaf

The eighth topic: In Khubb and sand in the pursuit between Safa and Marwa and ascension on Safa and Marwa

The ninth topic: In the ride and stand in the Arafah

The tenth subject: Riding in the sea and walking from the distant place

 

I ask God to be successful in the statement of these issues and limit them and put them together in one home for the reader to benefit from them and thank God first and last and God bless our master Muhammad and his good and pure family and his companions Almgaym.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 04 2023
Journal Name
Sar Journal Of Pathology And Microbiology
Prevalence of parasitic infections in Al-Kindy Teaching Hospital and Medical City Teaching Hospital
...Show More Authors

Background: Intestinal parasitic infections including amoebiasis, blastocystosis, giardiasis, are all worldwide distribution with harmful effects, it is an important cause of morbidity and death rate in the poor countries. Objective: This study was done to collect information of the frequency of these diseases in some regions of Baghdad. Our objectives are to detect the frequency of human pathogenic parasites in some regions of Baghdad in stool samples of patients who would attend to AL-Kindy Teaching Hospital, Medical City Teaching Hospital and to determine the most common age group affected. Materials and Methods: Data were collected from Al-Kindy Teaching Hospital and Medical City Teaching Hospital, in the lab of parasitology fro

... Show More
View Publication
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Energy Procedia
Humidity effect on diffusion and length coefficient of radon in soil and building materials
...Show More Authors

View Publication
Scopus (22)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Thu Jun 23 2022
Journal Name
American Scientific Research Journal For Engineering, Technology, And Sciences
A Review of TCP Congestion Control Using Artificial Intelligence in 4G and 5G Networks
...Show More Authors

In recent years, the field of research around the congestion problem of 4G and 5G networks has grown, especially those based on artificial intelligence (AI). Although 4G with LTE is seen as a mature technology, there is a continuous improvement in the infrastructure that led to the emergence of 5G networks. As a result of the large services provided in industries, Internet of Things (IoT) applications and smart cities, which have a large amount of exchanged data, a large number of connected devices per area, and high data rates, have brought their own problems and challenges, especially the problem of congestion. In this context, artificial intelligence (AI) models can be considered as one of the main techniques that can be used to solve ne

... Show More
View Publication
Publication Date
Wed Nov 07 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Measuring of C-reactive protein titer in patients with acute hepatitis-C Virus infection
...Show More Authors

Objective(s): To measure serum C-reactive protein (CRP) titer as a predictive diagnosis of acute hepatitis C virus (HCV)
infection.
Methodology: Two hundred and ten patients with acute HCV infection and 234 apparently healthy individuals as
control group were enrolled in this study in Baghdad medical city (Teaching Laboratories). The patents include
74(35.2%) females and 136 (64.8%) males with mean age (27±16.5) years. The control group includes 114 (48.7%)
females and 120 (51.3%) males with mean age (26±5.8) years. Blood samples were collected from out patients from
Alfadul in Baghdad city. Sera were separated and stored at 20 0
C. The diagnosis of acute HCV infection was based on
detection of HC Ag and anti- H

... Show More
View Publication Preview PDF
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Evaluation of Convective Heat Transfer and Natural Circulation in an Evacuated Tube Solar Collector
...Show More Authors

The evacuated tube solar collector ETC is studied intensively and extensively by experimental and
theoretical works, in order to investigate its performance and enhancement of heat transfer, for Baghdad climate
from April 2011 till the end of March 2012. Experimental work is carried out on a well instrumented collector
consists of 16 evacuated tubes of aspect ratio 38.6 and thermally insulated tank of volume 112L. The relation
between convective heat transfer and natural circulation inside the tube is estimated, collector efficiency, effect of
tube tilt angles, incidence angle modifier, The solar heating system is investigated under different loads pattern (i.e
closed and open flow) to evaluate the heat loss coefficient

... Show More
View Publication Preview PDF
Crossref (16)
Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Construction And Building Materials
Utilization of magnetic water in cementitious adhesive for near-surface mounted CFRP strengthening system
...Show More Authors

Cement-based adhesive (CBA) is used as a bonding agent in Carbon Fibre Reinforced Polymer (CFRP) applications as an alternative to epoxy-based adhesive due to the drawbacks of the epoxy system under severe service conditions which negatively affect the bond between the CFRP and strengthened elements. This paper reports the results of, an investigation carried out to develop two types of CBA using magnetized water (MW) for mixing and curing. Two magnetic devices (MD-I and MD-II), with different magnetic field strengths (9000 and 6000 Gauss) respectively, were employed for water magnetization. Different water flows with different water circulation times in the magnetizer were used for each device. Compressive and splitting tensile strength te

... Show More
Scopus (11)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Sat Oct 29 2022
Journal Name
Current Trends In Geotechnical Engineering And Construction
Automatic Co-registration of UAV-Based Photogrammetry and Terrestrial Laser Scanning in Urban Areas
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Preparation and In Vitro Permeation of Chlopheniramine Maleate (CPM) from Gel through Rat Skin
...Show More Authors

Chlopheniramine maleate ( CPM ) , is  one  of   the  H- receptor antagonist  ,  widely used  in allergic  diseases ,like skin rash  and  pruritis .CPM 3%w/w was successfully  loaded in  2%w/w  sodium alginate (SA)    as a gel    base ,  and  to be considered   as  a  selected  formula .It was found  that  the diffusion   of  CPM    through   the  skin  of  albino  rat   was     increased   as  the concentration  of  CPM  increased from 2 %w/w sodium alginate  ,  More

... Show More
View Publication Preview PDF
Crossref (1)
Crossref