Praise be to Allah, Lord of the Worlds and prayers to our master and our beloved Muhammad and to his God and companions.
The Sunnah of the prophet completed the prayer and delivery agreed to accept them as evidence of legislation, and the fundamentalists differed in accepting the news of Sundays in the pieces, and most likely if the hadeeth is proven, and completed the correct conditions there is no objection to accept it in branches and pieces. As for the work of the people of the city is one of the evidence adopted when the imam Malik, who is the Imam of the House of the Prophet's blessed immigration, and scientists differ greatly. If you offer a ruling and the ruling of the Hadith of the individual, and the rule of the work of the people of the city and incompatibility, whichever offers. The scholars differed in this matter on the words of them and most of the Maliki made the work of the people of the city and them Who gave the news of the correct ones To Oppose: Two equal arguments on Wuh Yugan correspond
The origins of scientists have set conditions for the opposition, including: the legitimacy of the two opposing evidence, the fact that the antagonism between the opposing in the face of contradiction, and equality in the evidence, there is no conflict between the book and the news of one only in terms of significance, equal strength, there is no conflict between the frequency and the ones, but offers frequent agreement. Their agreement in governance with the union of time, shop and region. The Imam Malik and with him the fundamentalists Maliki: that if they are unanimous on something transferred, or work connected, it is known to the frequent transfer of science, and excuses are interrupted, and must leave the news of ones; Because the city collected from the companions of the science is the news of the unanimous on the transfer of what Ha Oodh Khodroo one Bkhalafhukhanjh on you Alkbrotrk him.
Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show MoreThe objective of the study was to identify the effect of the use of the Colb model for the students of the third stage in the College of Physical Education and Sports Sciences, University of Baghdad,As well as to identify the differences between the research groups in the remote tests in learning skills using the model Colb.The researcher used the experimental method and included the sample of the research on the students of the third stage in the College of Physical Education and Sports Science / University of Baghdad by drawing lots, the third division (j) was chosen to represent the experimental group,And the third division (c) to represent the control groupafter the distribution of the sample splitting measure according to the Colb mode
... Show MoreThis study has taken into consideration two vital variables (leadership, leadership styles and intellectual capital). The research aim through the relations between the leadership styles and intellectual capital, to building conceptual frame for the variables of study and exploring the nature of correlation relations between these variables and their effects in enhancing intellectual capital.
The research was conducted at the Ministry of foreign in Iraq, and included a sample of leaders and subordinates amounted to (186), has been using the questionnaire as a key tool to collect data on the sample.
For the dealing with
... Show MoreEmployee Stealing or internal theft is considered from the passive practices that can’t be denied or be hidden, In spite of the hospital privacy as a serving organization that works 24\7 and deleing with human lives, they weren’t infallible from that kind of practice. To prevent or reduce this practice, it was important to search for the organizational and behavioral factors influencing internal thefts. The study problem briefly is to reach the most organizational and behavioral factors influencing internal theft, in governmental hospitals in Baghdad Rusafa Health district, this was done by analyzing (20) administrative cases of thefts occurred in the District, also a sample of (60) specialist Doctor’s opinion work, in (3) hospital
... Show MoreThe phenomenon of informal building Spread recently in Iraqi residential areas, in general, and in Baghdad, in particular, due to the urgent housing need, on the one hand, and lack of commitment to building controls, on the other hand, to highlight the phenomenon of uncommitted building to controls and housing governing legislation in Iraq, leading to heterogeneity in both building densities and plot areas, and disorder in the urban fabric and urban escape of those areas. Research problem identified as the absence of a clear vision about the General aspects of the phenomenon of informal building in residential street scene, and the role of designed housing projects as a substitute for informal building in built residential areas. The des
... Show MoreThe current research aims to identify the nature of the relationship between training human resources in administrative innovation elements In the General Directorate for the education of the third Rusafa one of the formations of the Iraqi Ministry of Education in Baghdad, In order to achieve the objectives of the research, the researcher provided a comprehensive theoretical framework and the preparation and development of a questionnaire as a tool for collecting data based on the prepared measurements and benefit from previous studies, which contains (28) For the purpose of obtaining realistic results for the variables of the research, the researcher used the random sample in the selection of the research sample A total of (63)
... Show MoreThis research tries to reveal how to manage and control the competitive edge for business by building managerial skills in various organizational levels. Our research aims at finding out the nature of various technical, human and in tellectual skills of a new president whose superiority is his competitive ness in the application field at general company for construe tioual industriesand testing the surveyed minor and major changes through a questionnaire to collect information from officials. The sample was composed of (45) director. The data was analyzed using some methods and statistical programs. The most prominent of these is (SPSS) that was used to extract the arithmetic mean, standard deviation, correlation coefficient
... Show MoreIn this study, the fission track registration technique with the CR-39 detector are using to determination the uranium concentrations for seventeen samples of teeth distributed in four districts in Baghdad City .Five samples taken from both Al-Durra District and Al-Jadiriyia District, Four samples taken from Al-Karrda (Alaatar street) Taken four samples and three samples taken from Al-Zuafrania and by 0.5gm in weight and 1.5 mm in thickness. The uranium concentrations in teeth samples measured by using fission tracks registration in (CR-39) track detector that caused by the bombardment of (U) with thermal neutrons from (241 Am-Be) neutron source that has flux of (5 ×103 n cm-2 s-1). The concen
... Show More