The Muslim woman actively participated in narrating, preserving, controlling and maintaining the hadith, along with her brother, the man who later became an inexhaustible representative of the effort to preserve, control, and narrate the Sunnah. Undoubtedly, the mothers of the believers, may God be pleased with them, had a great advantage in communicating Islam and spreading the Sunnah of the Prophet Especially among women, all of them heard from him, may God’s prayers and peace be upon him, and lived with him in the details of his life on the disparity between them in memorizing and narrating and publishing them. It narrated (378) recently, and it is considered the second narrator after the mother of the believers Aisha, may God be pleased with him Ha. The topics of her narrations, such as Aisha, may God be pleased with her, varied between rulings, interpretation, manners, supplications, and temptation ... even though most of them are in rulings with their various chapters and are overcome by practicality. The novel and the fatwa came to the fore after the death of Aisha, may God be pleased with her. And due to the importance of the narratives of the mother of the believers, the mother of Salamah, may God be pleased with her, I chose to contribute with a modest effort in explaining her jurisprudential narratives through the book (Reaching the Maram from the Evidence of Rulings) by Ibn Hajar Al-Asqalani (d. 852 AH) in the Book of Prayer.
The purpose of this research is to determine the relationship between the strategic thinking and organizational change via the use of many statistical methods such as Simple linear regression equation. The 80% of the hypotheses of correlation and influence were established, and the research was reached a number of conclusions. Including the fluctuation of the level of strategic thinking capabilities in the sample surveyed. Although, there are certain levels, but an organization of this importance need to be higher. Based on these conclusions, the researcher has made some recommendations to address the findings of the research. Reflexión del pensamiento estratégico sobre el cambio organizacional Resumen El propósito de esta investigación
... Show MoreThe book gives details about the healing power of love
In this paper we present the theoretical foundation of forward error analysis of numerical algorithms under;• Approximations in "built-in" functions.• Rounding errors in arithmetic floating-point operations.• Perturbations of data.The error analysis is based on linearization method. The fundamental tools of the forward error analysis are system of linear absolute and relative a prior and a posteriori error equations and associated condition numbers constituting optimal of possible cumulative round – off errors. The condition numbers enable simple general, quantitative bounds definitions of numerical stability. The theoretical results have been applied a Gaussian elimination, and have proved to be very effective means of both a prior
... Show MoreThe metric dimension and dominating set are the concept of graph theory that can be developed in terms of the concept and its application in graph operations. One of some concepts in graph theory that combine these two concepts is resolving dominating number. In this paper, the definition of resolving dominating number is presented again as the term dominant metric dimension. The aims of this paper are to find the dominant metric dimension of some special graphs and corona product graphs of the connected graphs and , for some special graphs . The dominant metric dimension of is denoted by and the dominant metric dimension of corona product graph G and H is denoted by .
The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject shou
... Show MoreAim of the research is the study of improving the performance of the thermal station south Baghdad and the main reasons for reduced its efficiency. South Baghdad power planet comprises (6) steam turbine units and (18) gas turbine units .The gas turbine units are composed of two groups: the first group is made up of gas units (1,2), each of capacity (123) MW. The design efficiency of gas turbine units is 32%. The actual efficiency data of steam units is 18.3% instead of 45% which is the design efficiency. The main reason for efficiency reduction of gas units is the rejected thermal energy with the exhaust gases to atmosphere, that are (450-510) ℃.The bad type of fuel used (heavy) fuel. Another reason for the low efficiency and has a neg
... Show MoreThis study deals with Aphid predators of the genus Coccinella L. recognized in different
regions of the world. They have been arranged systematically according to Korschefsky’s
catalogue (1931). The list includes sites of study and the reference (works) that consider
Coccinellids as predator. The study has revealed that there are thirteen Aphid predator species
belonging to the genus Coccinella L. in different places of the world, although there might be
other species that were not recorded by this work.
Doctrinal responses
On the fabrications of succor
Tamimi