This research deals with the hadiths of intimidation. An analytical study of the serious effects of intimidation in society. Intimidation and intimidation of a Muslim is a serious matter, because of the anxiety, intimidation, and dispossession of others ’rights, but some consider it easy, and others intimidate jokingly or seriously, which may lead to such intimidation to have effects Serious.
For intimidation entails the death of the individual, the disappearance of his mind, or the loss of his money, etc., from here the need was urgent; to show the vision of the prophetic Sunnah in denouncing intimidation, so we had this humble research tagged with (hadiths prohibiting the intimidation of a Muslim in the books The six are an analytical study.
The research problem lies in the knowledge of the hadiths that show the vilification of intimidation, and its study is an analytical study to arrive at the reality of intimidation, its types and its effects, because of the harm that people cause to others and the harm they do to their destruction.
The research contains an introduction, and two topics: the first topic: the meaning of intimidation, and the second topic: the study of hadiths an analytical study. She concluded with a conclusion, and recorded her most important results.
Spices are natural substances taken from special plants and have a different taste when added to food and some of them have great benefits for health and body. These plants vary from country to country depending on the type of soil and how they are grown and this affects their quality. In this study, the specific activity of 40K, 238U and 232Th series and 137Cs in some selected natural food spices commonly used in Iraq kitchen were determined using gamma spectrometry and the ingested doses via food consumption were also assessed. The average specific activity of 40K, 238<
The Rivest–Shamir–Adleman (RSA) and the Diffie-Hellman (DH) key exchange are famous methods for encryption. These methods depended on selecting the primes p and q in order to be secure enough . This paper shows that the named methods used the primes which are found by some arithmetical function .In the other sense, no need to think about getting primes p and q and how they are secure enough, since the arithmetical function enable to build the primes in such complicated way to be secure. Moreover, this article gives new construction of the RSA algorithm and DH key exchange using the
primes p,qfrom areal number x.
In the present study, an attempt has been made to study the change in water quality of the river in terms of turbidity during lockdown associated with COVID-19. Iraq announced the longest-ever lockdown on 25 March 2020 due to COVID-19 pandemic.
In the absence of ground observations, remote sensing data was adopted, especially during this period. The change in the visible region's spectral reflectance of water in part of the river has been analyzed using the Landsat 8 OLI multispectral remote sensing data at Tigris River, Salah al-Din province (Bayji / near the refinery), Iraq. It was found that the green and red bands are most sensitive and can be used to estimate turbidity. Furthermore, the temporal variation in turbidity was a
... Show MoreAn expression for the transition charge density is investigated where the deformation in nuclear collective modes is taken into consideration besides the shell model transition density. The inelastic longitudinal form factors C2 calculated using this transition charge density with excitation of the levels for Cr54,52,50 nuclei. In this work, the core polarization transition density is evaluated by adopting the shape of Tassie model together with the derived form of the ground state two-body charge density distributions (2BCDD's). It is noticed that the core polarization effects which represent the collective modes are essential in obtaining a remarkable agreement between the calculated inelastic longitudinal F(q)'s and those of experimen
... Show MoreA (k,n)-arc A in a finite projective plane PG(2,q) over Galois field GF(q), q=p⿠for same prime number p and some integer n≥2, is a set of k points, no n+1 of which are collinear. A (k,n)-arc is complete if it is not contained in a(k+1,n)-arc. In this paper, the maximum complete (k,n)-arcs, n=2,3 in PG(2,4) can be constructed from the equation of the conic.
The construction industry plays a crucial role in the countries' economy, especially in the developed country. This point encourages the concerned institution to use new techniques and integrate many techniques and methods to maximize the benefits. The main objective of this research is to evaluate the use of risk management, value management, and building information modeling in the Iraqi construction industry. The evaluation process aims at two objectives. The direct objective was to evaluate the knowledge in risk management (RM), value management (VM), and building information modeling (BIM). The indirect objective was to support the participants with information related to the main items mentioned. The questionnaire
... Show MoreThe current research seeks to identify the impact of Barman's model on acquisition of the concepts of jurisprudence of worship among students of the departments of Qur'anic sciences. To achieve the research objectives, the researcher relied on the experimental method through a design with partial control by relying on two experimental groups receiving teaching by using the Barman model and a control group receives teaching through the normal method. After applying the experiment, the study reached the following results: Students of the Department of Qur’anic Sciences in general need educational programs linked to the curriculum and built on scientific foundations, according to their needs and problems (psychological, cognitive, and soc
... Show MoreThis paper presents the results of experimental investigation carried out on concrete model piles to study the behaviour of defective piles. This was achieved by employing non-destructive tests using ultrasonic waves. It was found that the reduction in pile stiffness factor is found to be about (26%) when the defect ratio increased from (5%) to (15%). The modulus of elasticity reduction factor as well as the dynamic modulus of elasticity reduction factor increase with the defect ratio