The search for wealth and money is a matter of ethics in the Islamic economy
God Almighty said: "We have honored the sons of Adam (and ridiculed the universe and what he said) mocked you
He said, "He who created you from the earth."
And he commanded you, and he said to him, "He who made you."
Land, and the amount of Rezko and
He said: "You love the money with great love."
And then guide him by exaggerating the ethics of Islam and its legislation in Tamkak and not exceeding it.
In order to darken the doors of inflation with wealth Vakar
And the hereafter and achieve satisfaction and fairness in all actions
To ensure that society has a right not to harm others and to abuse the interests of the economy
Islam is ethically balanced and responsive to human demands.
Gingival crevicular fluid (GCF) may reflect the events associated with orthodontic tooth movement. Attempts have been conducted to identify biomarkers reflecting optimum orthodontic force, unwanted sequallea (i.e. root resorption) and accelerated tooth movement. The aim of the present study is to find out a standardized GCF collection, storage and total protein extraction method from apparently healthy gingival sites with orthodontics that is compatible with further high-throughput proteomics. Eighteen patients who required extractions of both maxillary first premolars were recruited in this study. These teeth were randomly assigned to either heavy (225g) or light force (25g), and their site specific GCF was collected at baseline and aft
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreSome of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of select
... Show MoreIn this work, the study of corona domination in graphs is carried over which was initially proposed by G. Mahadevan et al. Let be a simple graph. A dominating set S of a graph is said to be a corona-dominating set if every vertex in is either a pendant vertex or a support vertex. The minimum cardinality among all corona-dominating sets is called the corona-domination number and is denoted by (i.e) . In this work, the exact value of the corona domination number for some specific types of graphs are given. Also, some results on the corona domination number for some classes of graphs are obtained and the method used in this paper is a well-known number theory concept with some modification this method can also be applied to obt
... Show MoreThis research is concerned with documenting traditional clothes of girls and children in Makkah in the past 100 years and is a step towards preserving our heritage which is exposed to rapid changes. The researcher’s goal is to contribute to the Saudi’s folklore studies with a qualitative study of clothes and ceremonies used in the past. Sources of information were collected from human and material samples, ceremonies, clothes, techniques used to embellish them and from previous studies. The study concludes that aspects of civilization influenced clothes and resulted in a great deal of change. Children wore scale-down versions of adult clothing. Costumes were rich by their styles and adornment. The researcher emphasizes the importance
... Show MoreObjective(s) : This study aimed at evaluating the seroprevalence of anti -HCV and studying the
correlation between hemophilia and risk factors for acquiring HCV such as age , marital status &
occupation among hemophilic patients .
Methodology : 210 hemophilic patients in children welfare teaching hospital/medical city/Baghdad–Iraq
(hemophilia center) were investigated using prepared questionnaire and tested for HCV infection, those
were measuring patient’s age, hemophilia types and severity, marital status, residency and history of
previous HCV infection .
Results : Most hemophilic patients were hemophilia A at severe , hemophilia was at age group 20 – 29
years , the majority of patients were unmarried a
Background: Thalassemias are a group of heterogeneous genetic disorders, in which the rate of production of hemoglobin is partially or completely suppressed due to reduced rate of synthesis of α or β- chain
Objectives: to estimate the prevalence of Hepatitis C infection among B thalassemia patients attending Ibn-AL-Baladi center of blood diseases in AL-Sader city, in AL-Resafa Quarter of Baghdad and to determine the possible risk factors.
Type of the study: Cross- sectional study.
Methods: A cross sectional study conducted on B Thalassemia patients attending the blood diseases center in Ibn-AL-Baladi hospital during the period from 1st
... Show MoreKE Sharquie, AA Al-Bayatti, AI Al-Ajeel, AJ Al-Bahar, AA Al-Nuaimy, Saudi medical journal, 2007 - Cited by 63
Objectives: To study the prevalence of rs1799964 (-1031 T/C) and rs361525 (- 238 G/A) SNPs and their effect on the disease activity, severity, and cytokines production in newly diagnosed Iraqi rheumatoid arthritis patients. Patients and Methods: sixty-three patients were diagnosed by a specialist physician while attending the rheumatology unit and twenty control participated. The inflammatory markers were measured and PCR amplification and sequencing were performed to demonstrate TNF-α SNPs. Results: Regarding (-1031 C/T) SNP, the TT genotype and allele C were significantly present in the controls, and the CT genotype was distributed significantly in the patients. The TT genotype was mostly distributed in the mild-moder
... Show MoreObjective: To evaluate the effectiveness of educational program on female students’ knowledge toward premenstrual syndrome.
Methodology: A quasi-experimental design study conducing on (140) student purposely in four secondary schools at Al-sadder city (70) student for study group and (70) for control group. The prevalence of PMS selected through American College of Obstetricians and Gynecologists (ACOG) (2015) criterias to select PMS students before program. The education program were set in four steps, the first step (pre-test) is to assess the knowledge , before the implementation of the program, the second step is implementing the program, following two steps post-test I and II between each test two weeks. Validity is determined