Most of the texts of Islamic law provide for the payment of damage and the denial of the human ... Damage of all kinds of material and moral, which is in the harm that affects the human being in himself or his offer or money or other affairs respected by Sharia. A person can defend himself, his mind, his religion, his offer and his money (the five imperatives) as much as he can. Islam rejects violence directed without a legitimate right and does not endorse aggression against others. Violence has been defined in language as a lack of compassion or against it or is a reprimand, bashing, and the blame ... It is in psychology: human behavior tainted by cruelty, oppression, and aggression, and is defined politically: it is deliberate civil disobedience to the law for religious, moral or political reasons. The provisions of Islam call for brotherhood and compassion and the use of the good word in persuasion with others without resorting to force, except in special cases almost the last in the record of sanctions as it is said: the last ironing treatment.
Praise be to God, prayer and peace upon our master Muhammad the Messenger of Allah peace be upon him mercy, gift, and grace, and rendered his family and the good righteous is followed until the Day of Judgment. After: The Koran
Despite all the possibilities, owned by Iraq for the production of fish, but there is low in the level of production and in the rate of per capita consumption is due to inter alia, the weakness of investment, stop government support, a significant decline in the quantities of water, the high proportion of salinity and the proportion of pollution in the water, the use of means and fishing methods are primitive, weak laws and legislation, the policy of dumping markets imported products. Despite all this research has shown that there are investment opportunities very large in this sector through the size of the market and the absorptive capacity and the growth of per capita income and cultural revelation
One of the infections that occurred on the Arabic tongue is melody, distortion and intruder, with it Arabic has moved away from classical Arabic, as it was taken from other western and eastern languages, the Arabic language is introduced, in addition to foreign words that are one of the causes of the deviation of classical Arabic in the era of eloquence
CO2 laser (10.6 μm) is the most often used laser in the oral surgery due to its high absorption by water of the oral tissues. Several benefits of the use of CO2 laser have been reported for oral surgical procedures. This study aims to evaluate the effect of CO2 laser on soft and hard oral tissues (in vitro study). This study was done on fresh tissues from sheep’s head. CO2Surgical Laser with different operation modes was used; 0.2 mm spot size using different laser parameters on the tongue, and bone making holes, incisions and cutting. The depths and widths of holes and incisions were measured using endodontic file under magnification. The speed of incisions was calculated and the required time for cutting was measured using sport clo
... Show MoreThis article introduces the concept of finitely null-additive set function relative to the σ– ring and many properties of this concept have been discussed. Furthermore, to introduce and study the notion of finitely weakly null-additive set function relative to the σ– ring as a generalization of some concepts such as measure, countably additive, finitely additive, countably null-additive, countably weakly null-additive and finitely null-additive. As the first result, it has been proved that every finitely null-additive is a finitely weakly null-additive. Finally, the paper introduces a study of the concept of outer measure as a stronger form of finitely weakly null-additive.
Cytokines are signaling molecules between inflammatory cells that play a significant role in the pathogenesis of a disease. Among these cytokines are interleukins (ILs) 17A and 33, and accordingly, the current case-control study sought to investigate the role of each of the two cytokines in the risk of developing multiple sclerosis (MS). Sixty-eight relapsing-remitting MS (RRMS) Iraqi patients and twenty healthy individuals (control group) were enrolled. Enzyme linked immunosorbent assay (ELISA) kits were used to determine serum levels of IL-17A and IL-33. Results revealed that IL-17A and IL-33 levels were significantly higher in MS patients than in controls (14.1 ± 4.5 vs. 7.5 ± 3.8 pg/mL; p < 0.001 and 65.3 ± 16
... Show MoreThe current research aims to identify the effect of Baska style on students’ achievement and the creative thinking in material rhetoric and the application of students for fifth grade literary. To achieve the study objectives, the researcher has designed an achievement test to measure group of students in the fifth grade literary in material application. The researcher chose a sample of 40 female students from Khansa School for Girls in Baghdad for the academic year (2014 - 2015), he applied the test on an exploratory sample consisted of 30 female students from the research community. The study resulted in being no statistically significant difference at the level of significance (0.05) between the mean scores of the experimental group
... Show MoreAlthough the Wiener filtering is the optimal tradeoff of inverse filtering and noise smoothing, in the case when the blurring filter is singular, the Wiener filtering actually amplify the noise. This suggests that a denoising step is needed to remove the amplified noise .Wavelet-based denoising scheme provides a natural technique for this purpose .
In this paper a new image restoration scheme is proposed, the scheme contains two separate steps : Fourier-domain inverse filtering and wavelet-domain image denoising. The first stage is Wiener filtering of the input image , the filtered image is inputted to adaptive threshold wavelet
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show More