This study aims to show some of Imam Al-Bukhari's criticism of the Hadith from the Metn side, and part of his methodology in dealing with the correct hadiths that are tainted by a bug. This research focuses on what Imam Al-Bukhari summarized in his Sahih illusion of the narrator in his attribution, or uniqueness of the narrator, or to suggest a novel. We find that Bukhari sometimes abbreviates the hadeeth, and does not bring it out completely in his Sahih. He is satisfied with the abbreviated position but has done so because of a bug in it. The Bukhari usually does not declare his intention but knows this through tracking, inspection, and research of the correct hadiths.
This study aimed at identifying the counseling needs for classroom teachers specialization in
Jerash university. The sample of the study consisted (112) students. To achieve this goal a
scale with (39) items was built by the researcher, this scale has four domains they are as
follows; family, social, psychological and academic domain. The results of this study showed
that counseling needs obtain the heighest average. As well as, the results of the study revealed
that there were statistical differences in favor of gender and teaching year variable. Finally the
study stated a list of recommendations.
Police play an important role in any society. Where they maintain public order by stopping and deterring crime and bringing criminals to justice. In order to achieve these objectives, they have certain means of law (search, arrest, use of force that may be lethal in some cases). However, such means may be misused in a way that harms members of society such as (Exceeding the Scope of a search warrant, violation of privacy of individuals, False Imprisonment, Excessive use of force, Sudden Deaths in custody, Sexual Assault and Harassment, Failure to respond for Domestic violence calls), which raises the civil liability of police officers and their agencies for such damage. Police officers may even abuse their characteristics even outside offic
... Show MoreThe existence of the tax Coupled with the existence of the power of the political Sociality and the evolution of its concept differes according to the concept of the role of the state and its evolution in the economical life and it represents on of the main sources of funding one hand and an effective means that enables the state to intervene in various aspects of the economic life on the other hand. Tax also can be considered as a tool used to re-distribue the in class. Perhaps Iraq suffers from and in the marginalization to the role of taxes in funding and in turn the adoption of the Iraqi budget on oil revenues to finance the aspects of expenitvre which can pose a risk on the total Iraq
... Show MoreOccupy public investment spending, a great deal of attention since the thirties of the last century, to play important role in economic and social development process and therefore most of the countries are trying different degree of economic development to the completion of the largest amount of public investment, especially in infrastructure, which is one of the pillars essential to economic development, and in order to maximize utilization of the completion of public investment should focus on achieving efficiency in completion.
The current reality of public projects in Iraq, indicating the absence of several key characteristics that must be provided if these proje
Abstract:
This investigation was carried out to study the nutritional adequacy for
infant milk formula, which imported by Iraqi Ministry of Trade, and are
available in local markets .Most of these formulas contained nearly the same
composition of nutrients which are ,Matines ,Sunny Boy , Salsabeel AL- Badie
,Moroug, ,Charton ,Materna Lery Celia ,Lacstar Lailac,Nactalia. yet they are
unbalanced for providing the daily nutritional requirements for infants whom
depend on bottle feeding for six times daily in their first six month of age. As
there were an increase in daily intake for protein content and most vitamins
that included D, E, C, B1, B2, Niacin, B6, B12, and Biotin as well as most
minerals namely Calci
Background: During acrylic resin processing, the mold must be separated from the surface of the gypsum to prevent liquid resin from penetrating into the gypsum, and water from the gypsum seeping into the acrylic resin. For many years, tin foil was the most acceptable separating medium, and because it's difficult to apply, a tin-foil substitute is used. In this study, olive oil is used as an alternative to tin foil separating medium for first time, and evaluating its effect as a separating medium on some mechanical properties such as (indentation hardness and transverse strength) of acrylic resins denture base comparing it with those processed using tin-foil and tin foil substitute such as (cold mold seal) separating medium. Materials and M
... Show MoreThe research aims to apply a modified SERVQUAL model to evaluate the quality of the educational services via conducting exploratory research for students from the College of Administration and Economics- Department of Business Administration- Evening studies at the University of Baghdad. Questionnaire of two parts was distributed to a sample of (72) students out of (720) students of the 2nd.,3rd. and 4th. year in the beginning of the second semester of the year 2008-2009 to measure the expectations and perceptions to the quality of the educational services. Five major dimensions were analyzed to see the gaps for (22) variables. The study concluded that there were (13) variables confirmed that the
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreThe aim of this study is for testing the applicability of Ramamoorthy and Murphy method for identification of predominant pore fluid type, in Middle Eastern carbonate reservoir, by analyzing the dynamic elastic properties derived from the sonic log. and involving the results of Souder, for testing the same method in chalk reservoir in the North Sea region. Mishrif formation in Garraf oilfield in southern Iraq was handled in this study, utilizing a slightly-deviated well data, these data include open-hole full-set logs, where, the sonic log composed of shear and compression modes, and geologic description to check the results. The Geolog software is used to make the conventional interpretation of porosity, lithology, and saturation. Also,
... Show More