Preferred Language
Articles
/
jcois-1369
What Imam Ibn al-Subki disagreed with Imam al-Amadi in Tashnif al-Masma’, the chapter on analogy as a model
...Show More Authors

Takbiratul Ehram "The First Takbeer to Start Prayer" means: the words that the worshiper says to start his prayers, and refrain from anything invalidates it. the findings revealed that the four school jurists agreed that the prayer is not valid without Takbiratul Ehram "The First Takbeer to Start Prayer", and they disagreed on its description, so the majority of jurists said that it is a pillar, and some of them called it an obligatory, but Hanafi made it a condition. Likewise, the four jurists agreed that the one who articulates Takbiratul Ehram "The First Takbeer to Start Prayer" with the word: “Allahu Akbar,”; his Takbeer is correct, and they disagreed about the one who adds a word, or replaced it with another, where the majority scholars sees the necessity of articulating Takbiratul Ehram "The First Takbeer to Start Prayer" saying "Allahu Akbar", and the Hanafi said that it is valid in every divine words that exalts Allah. The research revealed that the scholars are unanimously agreed that the Prophet, may Allah's prayers and blessings be upon him, used to raise his hands when starting Takbeer. Among the findings of the study also is that the scholars disagreed about the characteristic of raising the hands, as the majority of scholars said that hands should be raised to the shoulders, and the Hanafi said that they should be raised the the ears, but the most correct saying is the first saying; because it is supported by many authentic hadiths.

The most important recommendations are: The necessity of urging imams and preachers to take care of Takbiratul Ehram "The First Takbeer to Start Prayer", according to jurisprudence and practice, and to explain this to the people, as well as urging scholars and teachers to teach their students the correct aspects of prayer through practical application not only the theoretical one driven by the Sunnah of the prophet.

 

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Saudi Medical Journal
The diagnostic power of circulating micro ribonucleic acid 34a in combination with cancer antigen 15-3 as a potential biomarker of breast cancer
...Show More Authors

View Publication
Scopus (12)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
360 degree reverse feedback / comparative analytical study for a sample of managers and heads of departments in the Central Electricity DepartmentAnd the General Directorate of Water and Sewage
...Show More Authors

يسعى البحث إلى الاهتمام بإحدى الوظائف المهمة في إدارة الموارد البشرية وهي تقويم الأداء التي تواجه مجموعة من الانتقادات والآراء السلبية، اذ ظهر في الأّونة الأخيرة أنموذج جديد يمكن إن يتجاوز تلك السلبيات وهو أنموذج التغذية العكسية المتعدد المصادر درجة .وقد حاول الباحثان توظيف هذا المفهوم في اثنتين من المنظمات العامة العراقية هما (دائرة كهرباء الوسط) التابعة لوزارة الكهرباء
و (دائرة الماء والمجاري) ال

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Al–bahith Al–a'alami
Digital Communication: The Future of Identity in Arab TV Drama: A Field Study on a Sample of Arab Society in the UAE in 2017
...Show More Authors

The digital communication of a product of communication and information revolution. It is characterized by accurate and comprehensive in its services and its effects, which brought changes in the structure of many communities and their organizational structures. They have significant impacts on the social systems and social relations, especially in the Arab societies, which are the focus of the globalized Western media, for many reasons: economical, political , cultural and social.
According to this perception, the Arab identity has become in an encounter with big challenges by the globalized media of trade and the media, which aims to achieve greater profits because of identity and its importance to the communities. This occurs par

... Show More
View Publication
Crossref
Publication Date
Fri Nov 01 2019
Journal Name
Journal Of Physics: Conference Series
The Bifurcation analysis of Prey-Predator Model in The Presence of Stage Structured with Harvesting and Toxicity
...Show More Authors
Abstract<p>For a mathematical model the local bifurcation like pitchfork, transcritical and saddle node occurrence condition is defined in this paper. With the existing of toxicity and harvesting in predator and prey it consist of stage-structured. Near the positive equilibrium point of mathematical model on the Hopf bifurcation with particular emphasis it established. Near the equilibrium point E<sub>0</sub> the transcritical bifurcation occurs it is described with analysis. And it shown that at equilibrium points E<sub>1</sub> and E<sub>2</sub> happened the occurrence of saddle-node bifurcation. At each point the pitch fork bifurcation occurrence is not happened. </p> ... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Proceedings Of The 2020 2nd International Conference On Sustainable Manufacturing, Materials And Technologies
The impact of toxicant on the food chain ecological model
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Civil Engineering Journal
Calibration of a New Concrete Damage Plasticity Theoretical Model Based on Experimental Parameters
...Show More Authors

The introduction of concrete damage plasticity material models has significantly improved the accuracy with which the concrete structural elements can be predicted in terms of their structural response. Research into this method's accuracy in analyzing complex concrete forms has been limited. A damage model combined with a plasticity model, based on continuum damage mechanics, is recommended for effectively predicting and simulating concrete behaviour. The damage parameters, such as compressive and tensile damages, can be defined to simulate concrete behavior in a damaged-plasticity model accurately. This research aims to propose an analytical model for assessing concrete compressive damage based on stiffness deterioration. The prop

... Show More
Scopus (27)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of The College Of Languages (jcl)
Metaphor in Political Discourse Press Articles By Louis Bassets As A Model: La metáfora en el discurso político. Los artículos de Lluís Bassets como ejemplo
...Show More Authors

       The present paper focuses on studying a rhetorical form often used in Spanish linguistic discourse .It also examines the study two sides (theoretical and practical), the concept of metaphor, the most important modern school that deals with this issue, the development of this technique and its relationship with other intellectual ideologies, and the role metaphor plays in interpreting the meaning of the linguistic discourse especially in conveying political message. The study allows the formulation and the creation of a conceptual picture for the purposes of metaphor in the linguistic discourse used in Spanish press. It investigates discursive models from the Spanish press,

... Show More
View Publication Preview PDF
Crossref