God Almighty set out to build mosques, and he commanded to seek their architecture, and the competition for them, and allocate them with types of worship that are not valid in others, and to preserve their sanctity and not to be degraded and taken for mundane purposes and special benefits, because they are considered one of the most prominent features of Islam and the rituals of Islamic society, so this research came to show the rule Sharia in various and contemporary issues that are needed by the imams of the mosques, their rulers, and those responsible for them. Among the issues in which they have examined comparative juristic research and reached the most correct opinion are:
Building mosques over or under buildings and factories is an urgent matter that is needed and it is due to the rules of interests and spoils, and confusion, raising the voice, chanting misguided and so on from worldly purposes is prohibited by law, and it is permissible to sleep in the mosque for a traveler or forced to not take it normally, as it is not permissible Insulting the sanctity of the mosque by taking it as a factory, laboratory, or store, as well as not permitting the mosque to take a path as a matter of habit, and using the mosque's loudspeakers for a special interest is prohibited from it, and it is permissible for what is in need of emergency for the needy, needy, or order of public benefit.
And it is not permissible to use the mosque’s water and its electricity for a private interest without the prior permission of the person in charge of the mosque or who is in charge of it and that the origin in the contents of the mosque and its endowment things is also permissible to eat and drink in the mosque with specific controls and that the permissibility of a marriage contract in the mosque to obtain the blessing of the place is a legitimate matter.
Then the basic principle in planting trees in the mosque is the prohibition, and if it is found, its fruit will be eaten in exchange for compensation, which will be spent on the interests of the mosque, and in another form it is permissible to eat without compensation
It is permissible to sing and praise in the mosque, which includes judgment, preaching, and an invitation for good and right, with conditions and controls, as well as sports and games, taking into account the sanctity of the mosque and its cleanliness and the limits of need, and that praying for the dead in the mosque is that the security of its pollution is permissible according to Islamic law, and seeking religious and secular knowledge in the mosque is a legitimate matter and its controls , God and the Pacific to either way.
Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show MoreThe consumption of dried bananas has increased because they contain essential nutrients. In order to preserve bananas for a longer period, a drying process is carried out, which makes them a light snack that does not spoil quickly. On the other hand, machine learning algorithms can be used to predict the sweetness of dried bananas. The article aimed to study the effect of different drying times (6, 8, and 10 hours) using an air dryer on some physical and chemical characteristics of bananas, including CIE-L*a*b, water content, carbohydrates, and sweetness. Also predicting the sweetness of dried bananas based on the CIE-L*a*b ratios using machine learn- ing algorithms RF, SVM, LDA, KNN, and CART. The results showed that increasing the drying
... Show MoreThis paper analysed the effect of electronic internal auditing (EIA) based on the Control Objectives for Information and Related Technologies (COBIT) framework. Organisations must implement an up-to-date accounting information system (AIS) capable of meeting their auditing requirements. Electronic audit risk (compliance assessment, control assurance, and risk assessment) is a development by Weidenmier and Ramamoorti (2006) to improve AIS. In order to fulfil the study’s objectives, a questionnaire was prepared and distributed to a sample comprising 120 employees. The employees were financial managers, internal auditors, and workers involved in the company’s information security departments in the General Company for Electricity D
... Show MoreThis paper investigates the experimental response of composite reinforced concrete with GFRP and steel I-sections under limited cycles of repeated load. The practical work included testing four beams. A reference beam, two composite beams with pultruded GFRP I-sections, and a composite beam with a steel I-beam were subjected to repeated loading. The repeated loading test started by loading gradually up to a maximum of 75% of the ultimate static failure load for five loading and unloading cycles. After that, the specimens were reloaded gradually until failure. All test specimens were tested under a three-point load. Experimental results showed that the ductility index increased for the composite beams relative to the refe
... Show MoreTwitter data analysis is an emerging field of research that utilizes data collected from Twitter to address many issues such as disaster response, sentiment analysis, and demographic studies. The success of data analysis relies on collecting accurate and representative data of the studied group or phenomena to get the best results. Various twitter analysis applications rely on collecting the locations of the users sending the tweets, but this information is not always available. There are several attempts at estimating location based aspects of a tweet. However, there is a lack of attempts on investigating the data collection methods that are focused on location. In this paper, we investigate the two methods for obtaining location-based dat
... Show MoreIn this paper a prey - predator model with harvesting on predator species with infectious disease in prey population only has been proposed and analyzed. Further, in this model, Holling type-IV functional response for the predation of susceptible prey and Lotka-Volterra functional response for the predation of infected prey as well as linear incidence rate for describing the transition of disease are used. Our aim is to study the effect of harvesting and disease on the dynamics of this model.
The rapid increase in the number of older people with Alzheimer's disease (AD) and other forms of dementia represents one of the major challenges to the health and social care systems. Early detection of AD makes it possible for patients to access appropriate services and to benefit from new treatments and therapies, as and when they become available. The onset of AD starts many years before the clinical symptoms become clear. A biomarker that can measure the brain changes in this period would be useful for early diagnosis of AD. Potentially, the electroencephalogram (EEG) can play a valuable role in early detection of AD. Damage in the brain due to AD leads to changes in the information processing activity of the brain and the EEG which ca
... Show MoreIn the current study, synthesis and characterization of silver nanoparticles (AgNPs) before and after functionalization with ampicillin antibiotic and their application as anti-pathogenic agents towards bacteria were investigated. AgNPs were synthesized by a green method from AgNO3 solution with glucose subjected to microwave radiation. Characterization of the nanoparticles was conducted using UV-Vis spectroscopy, scanning electron microscopy (SEM), zeta potential determination and Fourier transform infrared (FTIR) spectroscopy. From SEM analysis, the typical silver nanoparticle particle size was found to be 30 nm and Zeta potential measurements gave information about particle stability. Analysis of FTIR patterns and UV-VIS spectroscopy con
... Show MoreGreen synthesis methods have emerged as favorable techniques for the synthesis of nano-oxides due to their simplicity, cost-effectiveness, eco-friendliness, and non-toxicity. In this study, Nickel oxide nanoparticles (NiO-NPs) were synthesized using the aqueous extract of Laurus nobilis leaves as a natural capping agent. The synthesized NiO-NPs were employed as an adsorbent for the removal of Biebrich Scarlet (BS) dye from aqueous solution using adsorption technique. Comprehensive characterization of NiO-NPs was performed using various techniques such as atomic force microscopy (AFM), Fourier transform infrared (FTIR), X-ray diffraction (XRD), Brunauer-Emmett and Teller (BET) analysis, and scanning electron microscopy (SEM). Additionally, o
... Show More