This research deals with the hadiths of intimidation. An analytical study of the serious effects of intimidation in society. Intimidation and intimidation of a Muslim is a serious matter, because of the anxiety, intimidation, and dispossession of others ’rights, but some consider it easy, and others intimidate jokingly or seriously, which may lead to such intimidation to have effects Serious.
For intimidation entails the death of the individual, the disappearance of his mind, or the loss of his money, etc., from here the need was urgent; to show the vision of the prophetic Sunnah in denouncing intimidation, so we had this humble research tagged with (hadiths prohibiting the intimidation of a Muslim in the books The six are an analytical study.
The research problem lies in the knowledge of the hadiths that show the vilification of intimidation, and its study is an analytical study to arrive at the reality of intimidation, its types and its effects, because of the harm that people cause to others and the harm they do to their destruction.
The research contains an introduction, and two topics: the first topic: the meaning of intimidation, and the second topic: the study of hadiths an analytical study. She concluded with a conclusion, and recorded her most important results.
The Gulf Cooperation Council (GCC) is the only one in the Arab system, which has been able to formulate a strategic vision with its dimensions and objectives, and that for its great achievements have contributed significantly to the development of the external and internal economic relations of the Gulf Cooperation Council six through the consolidation of economic policies, projects and joint institutions . There is no doubt that the establishment of the Cooperation Council for the Arab Gulf States six, has made security expensive as long as the aspiration to them the leaders and peoples of the region is the adoption of the GCC countries on itself in order to build a self strength ensures cut off the road to all interference in the affai
... Show MoreSurvival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d
... Show MoreThe current study was carried out to find out the relationship between the Above-Ground Biomass and the spectral vegetative indices (Normalized Difference Vegetation Index, Soil Adjusted Vegetation Index, Difference Vegetation Index) (NDVI, SAVI, DVI) for soils with different salinity levels. Al Salamiyat Project was chosen as a study area located at an altitude of 34 m above sea level and within the geographical coordinates (E 44°.09´13.65´´ N 33°.25´ 07.87´´ and E 44°.17´ 46.03´´ N 33°.2l´40.72´´), with a total area of 14265 Dunum. Surface and subsurface soil samples were chosen from the study area and according to the previously defined salinity units, except for th
In this paper, we investigate two stress-strength models (Bounded and Series) in systems reliability based on Generalized Inverse Rayleigh distribution. To obtain some estimates of shrinkage estimators, Bayesian methods under informative and non-informative assumptions are used. For comparison of the presented methods, Monte Carlo simulations based on the Mean squared Error criteria are applied.
Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreIn this paper, a comparison between horizontal and vertical OFET of Poly (3-Hexylthiophene) (P3HT) as an active semiconductor layer (p-type) was studied by using two different gate insulators (ZrO2 and PVA). The electrical performance output (Id-Vd) and transfer (Id-Vg) characteristics were investigated using the gradual-channel approximation model. The device shows a typical output curve of a field-effect transistor (FET). The analysis of electrical characterization was performed in order to investigate the source-drain voltage (Vd) dependent current and the effects of gate dielectric on the electrical performance of the OFET. This work also considered the effects of the capacitance semiconductor on the performance OFETs. The value
... Show MoreIn this work, the nuclear electromagnetic moments for the ground and low-lying excited states for sd shell nuclei have been calculated, resulting in a revised database with 56 magnetic dipole moments and 41 electric quadrupole moments. The shell model calculations are performed for each sd isotope chain, considering the sensitivity of changing the sd two-body effective interactions USDA, USDE, CWH and HBMUSD in the calculation of the one-body transition density matrix elements. The calculations incorporate the single-particle wave functions of the Skyrme interaction to generate a one-body potential in Hartree–Fock theory to calculate the single-particle matrix elements. For most sd shell nuclei, the experimental data are well rep
... Show MoreAbstract
The aim of the present research is to identify the test wisdom and the preoccupation with learning and psychological tension among postgraduate students at the University of Samarra according to the variables of the department, gender, age, and employee or non-employee, and revealing the relationship between the test wisdom and the preoccupation with learning and psychological tension. The research sample consisted of (75) students randomly selected from postgraduate students at the college of Education. The researcher applies test –wisdom of (Mellman & Ebel) and measurement of preoccupation with learning prepared by (Al-zaabi 2013) also, the researcher used the scale of t
... Show More