Preferred Language
Articles
/
jcois-813
The hadiths that al-Mazy cited in his book "Tuhfat al-Ashraf" from the Imam Ahmad Imam's collection and study
...Show More Authors

This research seeks to attempt to reveal the intention of Al-Hafiz Al-Mazi from his market to hadiths from Imam Ahmad’s Musnad in his book “Masterpiece of Supervision in Knowing the Parties”, and researchers know that this book was classified by Al-Mazi to collect the parties to the six books: Sahih Al-Bukhari, Sahih Muslim, Sunan Abi Dawud, Jamea Al-Tirmidhi and Sunan Al-Nasa’i and Sunan Ibn Majah, in addition to some of the books ’authors’ books, and arranging them according to the Musnad, and it is not Musnad Ahmad from his condition, even if it is close to the arrangement of Mazi’s work, as he was a follower of that to the original owner Abu al-Qasim bin Asaker in his book “Supervising Knowledge of the Parties” in Most of the book plan, even though it has more citations, benefits and caution At, there were motives and goals behind the narration of these accounts from Musnad Ahmad.
The researcher has adopted the method of the modernists in trying to stand on Murad Al-Mazy, by collecting the methods of conversation, identifying the place of difference, comparison and balance between the ranks of the narrators, taking into account the clues and weightings that narrate the novel, and relying on the statements of critics and imams of the ills, and the presentation style may differ from one talk to another short and long According to the requirements of facts, scientific evidence and the requirements to clarify the idea to the Holy Reader.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Aug 31 2019
Journal Name
Iraqi Journal Of Physics
Investigate Salts type and concentration on the conductivity of Polymer Electrolyte
...Show More Authors

Polymer electrolytes systems compose of (PEO+KI+I2) and (PEO+RbI+I2) with different concentration, and a fixed amount of ethylene carbonate (EC) and propylene carbonate (PC) over temperatures range 293-343 K prepared by solution cast me

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
International Journal Of Scientific Research In Knowledge
The Impact of Teenage Pregnancy on Maternal, Fetal and Neonatal Outcomes
...Show More Authors

Adolescent pregnancy is common health problem still found in both developed and developing countries; as adolescent may have early sexual practice or early marriage. Adolescent mothers face substantially higher maternal and perinatal morbidity and mortality than adult women. This is a randomized prospective clinical study conducted at Al-Elwiya Maternity Teaching Hospital, Baghdad, Iraq. The objective of this work is to assess the adverse maternal, fetal and neonatal outcomes in early and late teenage pregnant mothers. Study sample consisted of 220 primigravid women with a singleton, cephalic, viable fetus and no congenital abnormality that gave birth at Al-Elwiya Maternity Teaching Hospital, Baghdad, Iraq. The 1stgroup: early teenage (46 w

... Show More
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Advanced Pharmacy Education And Research
The effect of formulation and process variables on prepared etoricoxib ‎Nanosponges
...Show More Authors

View Publication
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
Some Results on the Average Inverse Shadowing Property and Strong Ergodicity
...Show More Authors

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Materials Today: Proceedings
Hydraulic behaviour and improving of water quality of the Chibayish Marshes
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Theoretical And Applied Information Technology
A Survey on the Vein Biometric Recognition Systems: Trends and Challenges
...Show More Authors

Vascular patterns were seen to be a probable identification characteristic of the biometric system. Since then, many studies have investigated and proposed different techniques which exploited this feature and used it for the identification and verification purposes. The conventional biometric features like the iris, fingerprints and face recognition have been thoroughly investigated, however, during the past few years, finger vein patterns have been recognized as a reliable biometric feature. This study discusses the application of the vein biometric system. Though the vein pattern can be a very appealing topic of research, there are many challenges in this field and some improvements need to be carried out. Here, the researchers reviewed

... Show More
Publication Date
Tue Jan 16 2024
Journal Name
International Journal Of Analysis And Applications
Fear and Hunting Cooperation's Impact on the Eco-Epidemiological Model's Dynamics
...Show More Authors

Due to the fact that living organisms do not exist individually, but rather exist in clusters interacting with each other, which helps to spread epidemics among them. Therefore, the study of the prey-predator system in the presence of an infectious disease is an important topic because the disease affects the system's dynamics and its existence. The presence of the hunting cooperation characteristic and the induced fear in the prey community impairs the growth rate of the prey and therefore affects the presence of the predator as well. Therefore, this research is interested in studying an eco-epidemiological system that includes the above factors. Therefore, an eco-epidemiological prey-predator model incorporating predation fear and

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (23)
Crossref (12)
Scopus Crossref
Publication Date
Fri Dec 31 2021
Journal Name
Political Sciences Journal
The US-Iranian dispute and its repercussions on Iraq After 2003
...Show More Authors

Receipt date: 8/8/2020 acceptance date: 9/11/2020 Publication date: 31/12/2021

Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 International License.

           The American-Iranian relations have been characterized by tensions since the arrival of the guardian jurist regime in Iran to leadership in 1979, as it was considered a turning point not only in the cont

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 10 2024
Journal Name
The American Journal Of Interdisciplinary Innovation And
SUBJECT REVIEW PHASES OF SUGAR METABOLISM AND THE EFFECT OF HORMONES
...Show More Authors