In the name of of Allah the Merciful
Research Summary
This rule is one of the common rules between the sciences of the principles of jurisprudence and the jurisprudence rules. It is originally a fundamental rule because it relates to one of the topics of the science of the principles of jurisprudence, which is ijtihad. The ruling on reversing his ijtihad is permissible or not (1), and for this reason Ibn Al-Subki titled it in his book Al-Ishbah wa Al-Nazaer by saying: “What invalidates the judge’s judgment and what does not invalidate it.” ([2]).
The importance of this rule comes from the need for it by the judge, the mufti and the imitator, for the judge needs it to know the matters in which the ruling base
... Show MoreSn effect on the phase transformation behavior, microstructure, and micro hardness of equiatomic Ni-Ti shape memory alloy was studied. NiTi and NiTiSn alloys were produced using vacuum induction melting process with alloys composition (50% at. Ni, 50% at.Ti) and (Ni 48% at., Ti 50% at., Sn 2% at.). The characteristics of both alloys were investigated by utilizing Differential Scanning Calorimetry, X- ray Diffraction Analysis, Scanning Electron Microscope, optical microscope and vicker's micro hardness test. The results showed that adding Sn element leads to decrease the phase transformation temperatures evidently. Both alloy samples contain NiTi matrix phase and Ti2Ni secondary phase, but the Ti2Ni phase content dec
... Show MoreA water crisis is a circumstance in which a region accessible potable, unpolluted water is less than the requirement of that country. Two converging trends cause water scarcity, that are expanded use of irrigation, and loss of available freshwater supplies. Water scarcity can arise from two mechanisms, the physical water scarcity because of deficient natural water supply to fulfil the country demand, and economic water scarcity due to bad management for sufficient available water resources. This research examines data set as multispectral Landsat 8 satellite images that are detected for Basrah city, located in southern Iraq, and positioned between Kuwait and Iran on the Shatt al-Arab. Such raw data are satellite images. Using ENVI 5.3 softw
... Show MoreIn this work, we use the explicit and the implicit finite-difference methods to solve the nonlocal problem that consists of the diffusion equations together with nonlocal conditions. The nonlocal conditions for these partial differential equations are approximated by using the composite trapezoidal rule, the composite Simpson's 1/3 and 3/8 rules. Also, some numerical examples are presented to show the efficiency of these methods.
This work deals with determination of optimum conditions of direct diffusion bonding welding of austenitic stainlesssteel type AISI 304L with Oxygen Free High Conductivity (OFHC) pure copper grade (C10200) in vacuum atmosphere of (1.5 *10-5 mbr.). Mini tab (response surface) was applied for optimizing the influence of diffusion bonding parameters (temperature, time and applied load) on the bonding joints characteristics and the empirical relationship was evaluated which represents the effect of each parameter of the process. The yield strength of diffusion bonded joint was equal to 153 MPa and the efficiency of joint was equal to 66.5% as compared with hard drawn copper. The diffusion zone reveals high microhardness than coppe
... Show Moregenerator the metal conductor is replaced by conducting gas plasma.
A particular solution of the two and three dimensional unsteady state thermal or mass diffusion equation is obtained by introducing a combination of variables of the form,
η = (x+y) / √ct , and η = (x+y+z) / √ct, for two and three dimensional equations
respectively. And the corresponding solutions are,
θ (t,x,y) = θ0 erfc (x+y)/√8ct and θ( t,x,y,z) =θ0 erfc (x+y+z/√12ct)
The growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show More