This study aimed to clarify the provisions of taking the mother for breastfeeding in Islamic jurisprudence, a comparative study between doctrines of jurisprudence. The ruling on forcing the mother to breastfeed, and the ruling on taking the mother for breastfeeding while she is in the infallibility of her husband, as well as in several reactionary divorces, and the ruling on breastfeeding in several divorced divorces. On breastfeeding in infallibility Face, as well as a several divorce reactionary, and worth the fare which is in several final divorces, and after the end of the marital relationship, has been proposed a number of recommendations, including it, is recommended to teach the provisions of the mother taking the taxi on breastfeeding for university students and to participate with papers in conferences on this topic.
Dam and powerhouse operation sustainability is a major concern from the hydraulic engineering perspective. Powerhouse operation is one of the main sources of vibrations in the dam structure and hydropower plant; thus, the evaluation of turbine performance at different water pressures is important for determining the sustainability of the dam body. Draft tube turbines run under high pressure and suffer from connection problems, such as vibrations and pressure fluctuation. Reducing the pressure fluctuation and minimizing the principal stress caused by undesired components of water in the draft tube turbine are ongoing problems that must be resolved. Here, we conducted a comprehensive review of studies performed on dams, powerhouses, a
... Show MoreCommercial fish catch in the Iraqi marine waters from December 2018 to December 2019 was investigated. The study is based on three stations: the first station is located at the Shatt Al-Arab estuary, the second represents the area between the Shatt Al-Arab Estuary and open marine waters, and the third is associated with the Iraqi territorial marine waters. The total weight of the catch was 1881 kg, represented by 500, 654, and 727 kg in the first, second and third stations respectively. The third station was the highest with a majority of the family Sciaenidae by 464 kg, while the lowest was the family Scombridae by 0.5 kg. The total number of species included 37 species, belonging to 27 genera, 19 families, and 6 orders, the largest ord
... Show MoreLymphoma is a cancer arising from B or T lymphocytes that are central immune system components. It is one of the three most common cancers encountered in the canine; lymphoma affects middle-aged to older dogs and usually stems from lymphatic tissues, such as lymph nodes, lymphoid tissue, or spleen. Despite the advance in the management of canine lymphoma, a better understanding of the subtype and tumor aggressiveness is still crucial for improved clinical diagnosis to differentiate malignancy from hyperplastic conditions and to improve decision-making around treating and what treatment type to use. This study aimed to evaluate a potential novel biomarker related to iron metabolism,
... Show MoreThis study investigates the influence of Strategic Consensus (SC) on Organizational Performance (OP), with Strategic Alignment (SA) serving as a mediating variable, within private academic institutions in Iraq. The research utilized scales developed to measure each variable: SC, OP, and SA, all of which are unidimensional. The sample comprised 131 senior participants, including deans and faculty council members, with questionnaires distributed across three institutions: Dijla University College (35 respondents), Baghdad College of Economic Sciences (31 respondents), and the University of Uruk (65 respondents). Data analysis employed various statistical techniques, including normality testing, confirmatory factor analysis, descriptive statis
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreConstruction is a hazardous industry with a high number of injuries. Prior research found that many industry injuries can be prevented by implementing an effective safety plan if prepared and maintained by qualified safety personnel. However, there are no specific guidelines on how to select qualified construction safety personnel and what criteria should be used to select an individual for a safety position in the United States (US) construction industry. To fill this gap in knowledge, the study goal was to identify the desired qualifications of safety personnel in the US construction industry. To achieve the study goal, the Delphi technique was used as the main methodology for determining the desired qualifications for constructio
... Show More