Islamic law has relied on a number of sources in order to denote the rulings issued by them, including what is original and what is sub, and it is known to all scholars, that the Prophet's Sunnah is the second major source after the Koran, which separated the overall and devoted its year and restricted absolute. God Almighty obeyed the owner and his followers, and that his obedience of obedience to God Almighty said: (Who obeys the messenger has obeyed God) (women: 80), and then between the peasant who believes in him and his victory and follow him, he said: (and he said: And the one who was revealed with them were the successful ones (al-A'raf: 157).
It is known that the Sunnah commanded to follow is the correct fixed about him (), unlike the weak return and tracker of the history of the year finds that scientists, has dealt with most of its conversations criticism and scrutiny on the foundations of wound and amendment, to distinguish the true hadith of weak, because the acceptance of the Hadith is based on It is free from the ominous cause, hence the deep interest of scientists in the bug, to enable the people of modern competence and industry to stand on its reality, and to have a rule through which they distinguish the true talk of the weak, and may God Almighty to help me systems of what is often called modern Among the types of hadiths that were ailments, it weakened them, so I wished to study them in practice by examining its names (the cause and its problems when modernized through the epistemological systems). The nature of this research necessitated that the research should include after the introduction to the preface, researchers and conclusion, mentioned in the introduction the importance of the topic and the reason for writing it and the purpose of it, and dealt with in the introduction definition of the cause, types and manifestations, and known systems needles Names and reasons for their systems, and then provided full maturity, and devoted the first topic to talk about the ills contained in the bond, reinforcing them with practical examples, and made the second section of the ills contained in the bond and the body together with their practical examples.
Abstract: -
The concept of joint integration of important concepts in macroeconomic application, the idea of cointegration is due to the Granger (1981), and he explained it in detail in Granger and Engle in Econometrica (1987). The introduction of the joint analysis of integration in econometrics in the mid-eighties of the last century, is one of the most important developments in the experimental method for modeling, and the advantage is simply the account and use it only needs to familiarize them selves with ordinary least squares.
Cointegration seen relations equilibrium time series in the long run, even if it contained all the sequences on t
... Show MoreUrinary stones are one of the most common painful disorders of the urinary system. Four new technologies have transformed the treatment of urinary stones: Electrohydraulic lithotripsy, ultrasonic lithotripsy, extracorporeal shock wave lithotripsy, and laser lithotripsy.The purpose of this study is to determine whether pulsed holmium laser energy is an effective method for fragmenting urinary tract stones in vitro, and to determine whether stone composition affects the efficacy of holmium laser lithotripsy. Human urinary stones of known composition with different sizes, shapes and colors were used for this study. The weight and the size of each stone were measured. The surgical laser system which used in our study is Ho:YAG laser(2100nm)
... Show MoreThe important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi
... Show MoreUranium concentrations in soil were determined for ten locations in Salahdin governorate using CR-39 track detector, fission fragments track technique was used, the nuclear reaction of nuclear fission fragments obtained by the bombardment of 235U with thermal neutrons from (Am-Be) neutron source with flux (5000n.cm-2.s-1), the concentration values were calculated by a comparison with standard samples. The results of the measurements show that the uranium concentration in soil samples various from 0.42±0.018ppm in Beji province to 0.2±0.014 ppm in Tooz province with an average (0.31±0.08ppm), the values of uranium concentration in all samples are within the permissible limits universally.
Synthesis three organic inhibitors for carbon steel corrosion: 2-(propylthio)-1H-benzo[d]imidazole (PTBI), 2-(allylthio)- 1H-benzo[d]imidazole (ATBI) and 2-(prop-2-ynylthio)-1H-benzo[d]imidazole (YTBI) were prepared from reaction of 2-mercapto benzimidazole with different alkyl halide. The melting point and TLC were used to confirm the purity of the inhibitors as well as using the [FTIR, 1H-NMR and 13C-NMR] for the identify structures. The synthesized inhibitors were examined by potentiostatic polarization measurement as corrosion inhibitors of carbon steel in acidic media [1M H2SO4 ].The polarization measurement results showed that the mixed type inhibitors. In addition, the efficiency of inhibitors (YTBI) were studied at different con
... Show MoreListeria spp. is one of the abortion causative agents in animals, especially in ruminants. This work aimed to detect Listeria spp. in milk and aborted fetus cows in Iraq. A total of 50 organ samples from aborted cow fetuses, including (brain, liver, and spleen), and 50 milk samples from the same aborted cows were collected from Baghdad farms, Iraq from (October 2023- March 2024). The bacteria were identified by conventional culture methods, biochemical tests, and the VITEK2 compact system, followed by molecular confirmation. The antimicrobial resistance pattern assay was performed using the disc diffusion method against eight antibiotic agents, and the L.monocytogenes virulence genes involving prfA,actA, and hylA genes were detected using t
... Show MoreBackground BK polyomavirus is one of the common post-transplant viral infections, affecting ∼15% of renal transplantation recipients (RTR), leading to graft loss in more than half of cases. Objectives Study the rate of detection of BK virus (BKV) in RTRs in Pap-stained urine cytology specimens. Methods A single center study, urine samples were collected from 99 RTR patients, with 15 Living Donors (LD) and 15 patients with chronic kidney disease (CKD) were taken as controls. And urine cytology smears were Pap stained for detection of decoy cells (DCs). Results Out of the 99 RTRs, 27 (27.3%) patients were decoy positive, 8 out of these 27 patients had uncommon DCs, and 5 out of these 27 cytology positive patients (18.5%) had biopsy proven B
... Show MoreIn this paper, we proved coincidence points theorems for two pairs mappings which are defined on nonempty subset in metric spaces by using condition (1.1). As application, we established a unique common fixed points theorems for these mappings by using the concept weakly compatible (R-weakly commuting) between these mappings.