The principle of rights and duties is part of the reform project of the Commander of the Faithful Ali ibn Abi Talib, to build a state of institutions whose foundations have been built on Quranic rules, a prophetic biography, and his diligence in doing so in accordance with the requirements of interests and evil, and his certainty in determining the most important and important, and research analytical study of speeches Imam Ali and his career, in this study (the principle of rights and duties) of the ruler and the parish because of their role in the reform process, which depends on the demolition and construction together, as it is the responsibility of the ruler to demolish all constructed corrupt and contrary to the principles of Islam and its adoptions and requirements, to build It was replaced by a new edifice In line with the spirit and purposes of the Sharia.
There are titles adopted in this brief research such as respect and guarantee of the rights of dual brotherhood in religion and creation to reflect on the humanity of Islam centuries before the United Nations. Based on this duality, the basis of the relationship governed by and governed by the rights and duties that the imam must fulfill and maintain for his flock, such as the necessity of equality from the ruler to his flock in the financial tender, and that it must be equal to his flock before the law, the judiciary, and the borders. With this concise vocabulary, the three authorities (legislative, executive, and judicial) of the state administration are integrated in order to achieve social justice and social security, which are the two main pillars of the state administration. The importance of the role of the imam and its centralization as the supreme authority, which is the legislator and the codified. He must supervise the rest of the state facilities, directly or by proxy, to evaluate its institutions, monitor and hold its workers and employees accountable, punish those who are corrupt and corrupt, and conduct borders and retribution against them, so that people feel the prestige of the state and respect its laws; Law, State Law.
The Research aimed for identification the significant of health problems that occurrences through
misused of computer for those whom attaches with more than two hours daily and to identification the
nature of demographical characteristics variables and that related variables with using computer. Also to
know the level of user’s knowledge for some attaché’s equipment's and finally creating a new suggested
measurement scale for studying health problems that were occurred through misused of computer.
Creating questionnaire includes several domains (Social problems – family environment, Social problems –
external environment, some health problems attaches with related equipment's, psychological problems,
and hea
تحليل الأخطاء الصوتية في بعض كتب اللغة الروسية الدراسية
Conclusion
After this tour with Alkhund Al-Khurasani and his book “Adequacy of Fundamentals,” we can highlight the results we have got through what we have reviewed in the research:
- Al-Akhund Al-Khurasani was born and raised in a scientific environment that gave him from his childhood the opportunity to gain knowledge of achievement. Therefore, he left to seek knowledge from the beginning of his youth and toured the cities, then he went to Tehran and then He went to the holy city of Najaf, then left for Samarra, then returned to Najaf in order to work on the scholars and the student.
- Al Akhund al-Khorasani studied on several scholars , whether in Iraq or in Geran, and he
دور المعالجة الادراكية في اختزال البنية التصميمية للعلامة التجارية
הקדמה
הריאליזם הספרותי במשמעו הכללי מצייג אשר כל מה מציינת בה הספרות מציורים מדוייקים לסביבה ולכן אדם. ויש להתחשב בפרטים המשותפים לחיים היומיומית.
האסכולה הריאליזטית מצטיינת בזיאנרים אין זוכים בם איזו אסכולה ספרותית אחרת. האסכולה הזאת הופיעה בספרות העברית החדשה כתוצאה להשפעתה של הספרות העברית בס
... Show MoreThe organization and development of the irrigation system and agrarian reform in Iraq had an impact on the diversity of its methods and uses
Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t
... Show MoreThis paper presents a robust control method for the trajectory control of the robotic manipulator. The standard Computed Torque Control (CTC) is an important method in the robotic control systems but its not robust to system uncertainty and external disturbance. The proposed method overcome the system uncertainty and external disturbance problems. In this paper, a robustification term has been added to the standard CTC. The stability of the proposed control method is approved by the Lyapunov stability theorem. The performance of the presented controller is tested by MATLAB-Simulink environment and is compared with different control methods to illustrate its robustness and performance.
NH3 gas sensor was fabricated based on deposited of Functionalized Multi-Walled Carbon Nanotubes (MWCNTs-OH) suspension on filter paper substrates using suspension filtration method. The structural, morphological and optical properties of the MWCNTs film were characterized by XRD, AFM and FTIR techniques. XRD measurement confirmed that the structure of MWCNTs is not affected by the preparation method. The AFM images reflected highly ordered network in the form of a mat. The functional groups and types of bonding have appeared in the FTIR spectra. The fingerprint (C-C stretch) of MWCNTs appears in 1365 cm-1, and the backbone of CNTs observed at 1645 cm-1. A homemade sensi
... Show More<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show More