Preferred Language
Articles
/
jcois-850
ا Hadiths prohibiting the intimidation of a Muslim in the six books - an analytical study
...Show More Authors

This research deals with the hadiths of intimidation. An analytical study of the serious effects of intimidation in society. Intimidation and intimidation of a Muslim is a serious matter, because of the anxiety, intimidation, and dispossession of others ’rights, but some consider it easy, and others intimidate jokingly or seriously, which may lead to such intimidation to have effects Serious.
For intimidation entails the death of the individual, the disappearance of his mind, or the loss of his money, etc., from here the need was urgent; to show the vision of the prophetic Sunnah in denouncing intimidation, so we had this humble research tagged with (hadiths prohibiting the intimidation of a Muslim in the books The six are an analytical study.
The research problem lies in the knowledge of the hadiths that show the vilification of intimidation, and its study is an analytical study to arrive at the reality of intimidation, its types and its effects, because of the harm that people cause to others and the harm they do to their destruction.
The research contains an introduction, and two topics: the first topic: the meaning of intimidation, and the second topic: the study of hadiths an analytical study. She concluded with a conclusion, and recorded her most important results.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun May 01 2016
Journal Name
Journal Of Engineering
Assessing Asphalt and Concrete Pavement Surface Texture in the Field
...Show More Authors

The incorporation of safety characteristics into the traditional pavement structural design or in the functional evaluation of pavement condition has not been established yet. The design has focused on the structural capacity of the roadway so that the pavement can withstand specific level of repetitive loading over the design life. On the other hand, the surface texture condition was neither included in the AASHTO design procedure nor in the present serviceability index measurements.

The pavement surface course should provide adequate levels of friction and ride quality and maintain low levels of noise and roughness. Many transportation departments perform routine skid resistant testing, the type of equipment us

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 27 2025
Journal Name
European Scholar Journal
Carrier Liability In Successive Carriage Under The Iraqi Transport Law
...Show More Authors

This study investigates successive carriage, a distinct legal and commercial form of international transport, arising from the absence or irregularity of direct transport routes. Under this system, multiple carriers perform consecutive stages of transport under a single document, with the first carrier fully liable to the consignor or passenger, including breaches in subsequent stages. The research examines the role of direct and indirect transport documents and the concept of recourse, allowing a carrier who has compensated an injured party to seek reimbursement from other carriers. It highlights carriers’ duties to inspect goods, document their condition, and collect freight, and critically analyzes maritime carrier liability under Iraq

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 01 2009
Journal Name
Journal Of The College Of Languages (jcl)
The Quest for Stability in Willa Cathar’s Novle My Antonia
...Show More Authors

    Willa Cather (1873-1947) sought to capture the gradation of human emotion through carefully selected descriptive and narrative touches and firmly controlled management of dramatic scenes, situations, dialogue, and point of view. Cather’s novels and stories drew increasingly upon her personal experiences and memories.

    The old settlement of Virginia and the new lands of Nebraska formed the bedding ground for Willa Cather’s talents; so did the layers of memory she found across the North American continent, from New Mexico to Canada. She saw the full-blooded European immigrants, Czechs and Swedes, plowing the unbroken land, on the way up from peasants to proprietors.

  &nbsp

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 20 2019
Journal Name
Al-nahrain Journal For Engineering Sciences
Inducing Frictional Force to Enhance the Transient Response in Beams
...Show More Authors

This paper studies the effect of contact areas on the transient response of mechanical structures. Precisely, it investigates replacing the ordinary beam of a structure by two beams of half the thickness, which are joined by bolts. The response of these beams is controlled by adjusting the tightening of the connecting bolts and hence changing the magnitude of the induced frictional force between the two beams which affect the beams damping capacity. A cantilever of two beams joined together by bolts has been investigated numerically and experimentally. The numerical analysis was performed using ANSYS-Workbench version 17.2. A good agreement between the numerical and experimental results has been obtained. In general, results s

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Apr 08 1999
Journal Name
Abhath Al- Yarmouk [basic Sciences And Engineering]
Model for Predicting the Cracking Moment in Structural Concrete Members
...Show More Authors

Publication Date
Sat Sep 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
The Factors Affecting on Managing Sensitive Data in Cloud Computing
...Show More Authors

Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jan 19 2022
Journal Name
International Journal Of Inventions In Engineering & Science Technology
Biodiversity in the Northern Region using GIS and Remote Sensing
...Show More Authors

Biodiversity, biological diversity, biological diversity, biological diversity, biological diversity, biological diversity, biological diversity (by developmental factors) environmental factors and environmental factors environmental factors and environmental factors and environmental factors Correlation between biology and the succession of geological and historical factors of living organisms and geological and historical factors to the site and what It is surrounded by natural and tourist attractions and the pursuit of scientific methods in order to advance the studies of biological diversity in the region .

Publication Date
Fri Mar 04 2022
Journal Name
International Journal Of Research In Social Sciences & Humanities
Functional Load and Pronunciation Instruction in the Iraqi EFL Context
...Show More Authors

MR Younus, 2022

View Publication
Publication Date
Thu Aug 15 2019
Journal Name
Arab World English Journal For Translation And Literary Studies
The Unavoidable Suffering in Selected Literary Texts: Poems and Novels
...Show More Authors

View Publication
Crossref
Publication Date
Wed Sep 13 2023
Journal Name
Aip Conference Proceedings
Results for the (b,t)-blocking sets in PG(2,8)
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref