Preferred Language
Articles
/
jcois-850
ا Hadiths prohibiting the intimidation of a Muslim in the six books - an analytical study
...Show More Authors

This research deals with the hadiths of intimidation. An analytical study of the serious effects of intimidation in society. Intimidation and intimidation of a Muslim is a serious matter, because of the anxiety, intimidation, and dispossession of others ’rights, but some consider it easy, and others intimidate jokingly or seriously, which may lead to such intimidation to have effects Serious.
For intimidation entails the death of the individual, the disappearance of his mind, or the loss of his money, etc., from here the need was urgent; to show the vision of the prophetic Sunnah in denouncing intimidation, so we had this humble research tagged with (hadiths prohibiting the intimidation of a Muslim in the books The six are an analytical study.
The research problem lies in the knowledge of the hadiths that show the vilification of intimidation, and its study is an analytical study to arrive at the reality of intimidation, its types and its effects, because of the harm that people cause to others and the harm they do to their destruction.
The research contains an introduction, and two topics: the first topic: the meaning of intimidation, and the second topic: the study of hadiths an analytical study. She concluded with a conclusion, and recorded her most important results.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
The New Middle East and the Implications of the Arab Spring
...Show More Authors

الخلاصة لقد شكل المحافظون الجدد وهم بالأساس نخبة من المثقفين ومن السياسيين الأمريكيين كتلة ضغط كبيرة التأثير على الإدارة في عهد الجمهوريين. حمل هؤلاء المحافظون مشروعاً إيديولوجياً البسوه لسلطة الجمهوريين وهو يهدف إلى جعل أمريكا سيدة العالم من دون منازع خاصة بعد انهيار الاتحاد السوفييتي ونهاية الحرب الباردة. واكب هذا الحدث التاريخي الكثير من الأفكار ومنها (نهاية التاريخ)، وصراع الحضارات، وكذ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 04 2016
Journal Name
International Journal Of Renewable Energy Development
The Temperature Profile for The Innovative Design of the Perforated Fin
...Show More Authors

The development of the perforated fin had proposed in many studies to enhance the heat transfer from electronic pieces. This paper presents a novel derivative method to find the temperature distribution of the new design (inclined perforated) of the pin fin. Perforated with rectangular section and different angles of inclination was considered. Signum Function is used for modeling the variable heat transfer area. Set of parameters to handle the conduction and convection area were calculated. Degenerate Hypergeometric Equation (DHE) was used for modeling the Complex energy differential equation and then solved by Kummer’s series. In the validation process, Ansys 16.0-Steady State Thermal was used. Two geometric models were consider

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
THE LANGUAGE OF MEDIA BETWEEN THE CLASSICAL LANGUAGE AND THE DIALECT
...Show More Authors

The media: ((Providing people with the right news, audio information, and constant facts that help them form a correct opinion in an incident or a problem, this opinion gives an objective expression of the mentality of the audience, their trends and tendencies). The German scientist Autogroot defines it as "the objective expression of the mentality of the audience, their spirit, their tendencies, and their trends at the same time." Whereas for  "Aristotle", (Language) is a specific verbal system created as a result of an agreement between the members of the human group somewhere )). It is a symbol of thought, and  a difference between humans and animals. Pronunciation and thought for “Aristotle” are intertwined: without pro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Crisis of the Greeks (the euro crisis) and the lessons learned
...Show More Authors

After more than ten years of successful march of the European single currency and EU countries faced a crisis in one of its debt, which recently joined the monetary union is not Greece . Perhaps mpre than th effects of this crisis, the fact that its consequences were not confined to Greece alone , but expand it to include all EU countries in general and the countries of the European Monetary Union in particular.

Sine the debt crisis that emerged Greek and talk a lot a bout their effects on the global economy and the potential harm done th the situation of the global economy recovers from the global financial crisis (mortgage crisis), or delayed and also the fears of other crises to other member states suf

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 29 2023
Journal Name
International Journal Of Professional Studies
MULTIMODALITY IN THE COURTROOM IN AMERICAN AND BRITISH CRIMINAL CASES
...Show More Authors

PDBN Rashid, International Journal of Professional Studies, 2023

View Publication
Publication Date
Wed Nov 01 2017
Journal Name
Materials Chemistry And Physics
DFT + U and ab initio atomistic thermodynamics approache for mixed transitional metallic oxides: A case study of CoCu 2 O 3 surface terminations
...Show More Authors

This study develops a systematic density functional theory alongside on-site Coulomb interaction correction (DFT + U) and ab initio atomistic thermodynamics approachs for ternary (or mixed transitional metal oxides), expressed in three reservoirs. As a case study, among notable multiple metal oxides, synthesized CoCu2O3 exhibits favourable properties towards applications in solar, thermal and catalytic processes. This progressive contribution applies DFT + U and atomistic thermodynamic approaches to examine the structure and relative stability of CoCu2O3 surfaces. Twenty-five surfaces along the [001], [010], [100], [011], [101], [110] and [111] low-Miller-indices, with varying surface-termination configurations were selected in this study.

... Show More
View Publication
Scopus (18)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Sun Jan 10 2021
Journal Name
Acta Medica Iranica
Early Stages Non-Traumatic Avascular Necrosis of Femoral Head Treated by Core Decompression With and Without Platelets Rich Plasma Injection: A Comparative Study
...Show More Authors

Core decompression is one of the commonest used techniques in the handling of osteonecrosis of the pre-collapsed head of the femur. Core decompression had succeeded in preserving the hip joint and delaying the requisite for total hip replacement, but it had failed in the induction of osteogenesis in the necrotic area, thus augmenting core decompression with biological agents to induce osteogenic activity. To assess the effects of platelet-rich plasma in non-traumatic avascular necrosis of the hip joint (early stage) after core decompression. Interventional comparative study for twenty-four patients (32 hip joints) with AVN of the head of the femur was involved in this prospective study, and they were separated into two groups of 16

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 16 2021
Journal Name
Open Access Macedonian Journal Of Medical Sciences
A Comparative Study of Pediatric Fracture Shaft Femur Fixating by Plate and Screws Using Lateral Approach Between Subvastus Lateralis and Transvastus Lateralis Outcome
...Show More Authors

BACKGROUND: Femoral shaft fracture is a common fracture in pediatric age group reaching 62% of all fracture shaft femur in children in spite of rapid union rate and successful conservative treatment but some cases need surgical intervention and one of the methods using plate and screw by the lateral approach. AIM: This study aims to compare functional outcome fixation of mid-shaft femur fracture in children by plate and screws between (subvastus lateralis and transvastus lateralis) regarding infection, union, and limitation of knee movement. PATIENT AND METHOD: The study was done on 30 children who had diaphyseal fracture femur in Al-Kindy Teaching Hospital in period (April 2018–April 2020) with 6 months follow-up, and the pa

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Mar 01 2022
Journal Name
Journal Of Osseointegration & Oral Rehablitation
Evaluation of marginal bone loss around SLActive implants by CBCT using different implant dimensions and surgical approaches: A clinical and radiological prospective study
...Show More Authors

Aim: The reduction in the amount of marginal bone is the most important demand for the long term success of dental implants. This prospective clinical study was aimed to investigate the marginal bone loss of early loaded SLActive implants with different dimensions and surgical approaches. Materials and methods Fifteen patients aged from 18 to 60 years were divided into 2 groups (flapped and flapless approach) that underwent delayed implant placement protocol with SLActive implants. The marginal bone level was estimated by cone-beam computed tomography during three different periods: preoperatively, 8 weeks after surgery and 24 weeks after loading of the prosthesis. Results: The mean value of marginal bone level was not significantly chan

... Show More
View Publication Preview PDF
Scopus (5)
Scopus
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref