The Muslim woman actively participated in narrating, preserving, controlling and maintaining the hadith, along with her brother, the man who later became an inexhaustible representative of the effort to preserve, control, and narrate the Sunnah. Undoubtedly, the mothers of the believers, may God be pleased with them, had a great advantage in communicating Islam and spreading the Sunnah of the Prophet Especially among women, all of them heard from him, may God’s prayers and peace be upon him, and lived with him in the details of his life on the disparity between them in memorizing and narrating and publishing them. It narrated (378) recently, and it is considered the second narrator after the mother of the believers Aisha, may God be pleased with him Ha. The topics of her narrations, such as Aisha, may God be pleased with her, varied between rulings, interpretation, manners, supplications, and temptation ... even though most of them are in rulings with their various chapters and are overcome by practicality. The novel and the fatwa came to the fore after the death of Aisha, may God be pleased with her. And due to the importance of the narratives of the mother of the believers, the mother of Salamah, may God be pleased with her, I chose to contribute with a modest effort in explaining her jurisprudential narratives through the book (Reaching the Maram from the Evidence of Rulings) by Ibn Hajar Al-Asqalani (d. 852 AH) in the Book of Prayer.
There is no adopt in the importance of the optical communications in scientific civil and military applications because of it’s simplicity in manufacturing and it's low cost. The method of optical communication depends upon bearing the light beam the translated informations by a method called the light modulation. This method depends upon changing some light properties as frequency, amplitude and pulse duration according to the translating informations. The changes in the first two properties are concerned optically with the analog modulation while the third one concern at most with digital modulation. All past methods are expensive with low efficiency and needs electrical or magnetic fields. In this technique the source of voice used
... Show MoreThe legal nature of the Build-Operate-Transfer-Ownership Contract (B.O.T) The Build, Operate, and Transfer of Ownership Contract (BOT) has emerged as the most successful and safest method for involving the private sector in public sector services. The major infrastructure projects that are built through the BOT contract are no longer financed by the state and its budget, but the private sector has played a major role in financing These projects, especially developing countries that need to establish infrastructure or modernize their existing infrastructure, especially in the areas of transport, communications, services, electricity, water ..... and other public utilities.
The cuneiform texts considered one of the most important resources which play an important role help us to know how was the economic , politic and religious manner and every thing have relation of the history of Mesopotamia which contain many of information that enrich our knowldgement every side of Mesopotamia civilization since using writing as away to register the science and human knowldgement . The city of Sippar (Abu –Habba ) was one of most important city of ancient Mesopotamia which mentioned as one of first five Mesopotamian cities found before floating and it exposed through excavating rich one of them tablet which some of it dated to old Babylon period . The king Ammi-Saduqa has a big share of tablet we study number of thi
... Show MoreThe research aims to determine the role of the training strategy with its dimensions of (strategic analysis, formulation of training strategy, implementation of training strategy, evaluation) in the pioneering performance of the organization with its dimensions of (pre-planning , renewal and modernization, efficiency, effectiveness). Important and modern in pioneering performance and training strategy, and in recognition of the importance of the subject and the expected results of the surveyed banks, an analysis was made of the data obtained through field visits in addition to the questionnaire and interviews ,and the most prominent results that were reached were taking the research sample into consideration all the requirements of the trai
... Show MoreRecently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding
... Show MoreGlobal Navigation Satellite System (GNSS) is considered to be one of the most crucial tools for different applications, i.e. transportation, geographic information systems, mobile satellite communications, and others. Without a doubt, the GNSS has been widely employed for different scientific applications, such as land surveying, mapping, and precise monitoring for huge structures, etc. Thus, an intense competitive has appeared between companies which produce geodetic GNSS hardware devices to meet all the requirements of GNSS communities. This study aims to assess the performance of different GNSS receivers to provide reliable positions. In this study, three different receivers, which are produced by different manufactur
... Show MoreAbstract
We can see the phenomena of small and medium-sized enterprises, by important and a new subject contemporary, thro related between important concept that develop and add. This research focused on the important concept of small and medium-sized enterprises, in public and privet sectors. small and medium-sized enterprises discrimination by large filer ratio in the especially at the first years when they started because of the limited managerial skills, financial recourses and marketing problems. On it they will creative new procedures. this research treatment the core issues about wakens local and international enterprises, so threat. the goals of this research are extended malty dimension concept o
... Show MoreRecently, Knowledge Management Systems (KMS) consider one of the major fields of study in educational institutions, caused by the necessity to identify their knowledge value and success. Hence, based on the updated DeLone and McLean’s Information Systems Success Model (DMISSM), this study set out to assess the success of the Perceived Usefulness of Knowledge Management Systems (PUKMS) in Iraqi universities. To achieve this objective, the quantitative method is selected as the research design. In total, 421 university administration staff members from 13 Iraqi private universities were conducted. This study highlights a number of significant results depending on structural equation modeling which confirms that system, information, and s
... Show MoreGlobal Navigation Satellite System (GNSS) is considered to be one of the most crucial tools for different applications, i.e. transportation, geographic information systems, mobile satellite communications, and others. Without a doubt, the GNSS has been widely employed for different scientific applications, such as land surveying, mapping, and precise monitoring for huge structures, etc. Thus, an intense competitive has appeared between companies which produce geodetic GNSS hardware devices to meet all the requirements of GNSS communities. This study aims to assess the performance of different GNSS receivers to provide reliable positions. In this study, three different receivers, which are produced by different manufacturers, were fi
... Show More