Preferred Language
Articles
/
jcois-1387
The attitude of Imam Ibn Jarir al-Tabari to the occurrence of unanimous and its convening by statement of the majority in light of his interpretation - Jami` al-Bayan on the interpretation of the verse of the Qur’an -‘‘Applied Models’’
...Show More Authors

t

 

The research deals with the statement of the importance of unanimous in Islamic Sharia in terms of being the third source of Islamic legislation after the Holy Qur’an and the Sunnah of the Prophet, and the extent of interest of the scholars of interpretation in it, and those who took great interest in mentioning what was agreed upon in every site that necessitated mentioning its issues within, or mentioning an event that has encountered an unanimous, and in various sciences, to extract and extrapolate Sharia rules when these rules are lost in the texts, because it is based on them and derived from them. Among these distinguished scholars is Muhammad bin Jarir al-Tabari. Besides, the research discusses interpretational applications for some meanings of Quran’ vocabulary, as well as the opinion of al-Tabari in some Fiqh rules that he was singled out for based on his disagreement with the majority of fundamentalists on a fundamental issue of unanimous issues, namely: Does unanimous convenes when the most diligent of the scholars state about a matter that needs their unanimous? Or is it not convened without the agreement of all of them without violating any of them? So, he went on to say: The unanimous is convened with the disagreement of one and two of scholars in face of the agreement of most of the agreed ones, because the majorities are scholars and interpreters. Thus, he adopts the unanimous of the majority, and, for him, those who have not reached the limit of the frequency have been considered neither as a disagreement issue nor breaking the unanimous, nor disagreeing with it. In this issue, the majority of the scholars said: The condition for convening the unanimous along with its occurrence is the agreement of all diligents without fear of any one of them, otherwise there will be no unanimous

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 06 2015
Journal Name
مجلة
فعالية استخدام تدريبات القوة الدافعة الذاتية في تطوير القوة الخاصة و بعض القدرات الوظيفية و المهارية للاعبين الشبابا بالكرة الطائرة
...Show More Authors

Publication Date
Tue Jan 08 2019
Journal Name
Arab Science Heritage Journal
الأمير كوركوز الاويغوري دراسة في سيرته ودوره السياسي والاداري والاقتصادي والعمراني خلال العصر العباسي 624-641 هـ/ 1226- 1243 م
...Show More Authors

حظيت عدد من الشخصيات التاريخية ممن كان لها أثر واضح المعالم في تطور النظام الإداري والسياسي للإمبراطورية المغولية، بأهتمام عدد لا بأس به من الباحثين.

View Publication Preview PDF
Publication Date
Tue Dec 15 2015
Journal Name
Al-adab Journal
Anti-Militarism in Joseph Heller's Catch-22 المشاعر المناهضة للروح العسكرية في رواية جوزيف هيلر "كاتش 22"
...Show More Authors

يحاول البحث دراسة رواية الكاتب الاميركي جوزيف هيلر التي تحمل عنوان "كاتش 22" (1961). وفي تفحص دقيق لمحتويات الرواية نجد ان تركيزها الرئيس هو المشاعر المناهضة للروح العسكرية. ويقدم البحث شخصيات مختلفة في الرواية ويحاول ان يعكس من خلالها المشاعر المناهضة للروح العسكرية. وان البحث ناقش ايضاً تأثيرات التصرفات الخاصة والاحداث الرئيسة التي حدثت في القوة الجوية الاميركية. وتدور القصة بشكل رئيس حول بعض رجال القوة ال

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Ieee Access
An Evolutionary Algorithm With Heuristic Operator for Detecting Protein Complexes in Protein Interaction Networks With Negative Controls
...Show More Authors

View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2025
Journal Name
Al-khwarizmi Engineering Journal
Improving Barcode Vision Scanning Process using a Drone-based Tracking PID Controller for Warehouse in Industry 4.0
...Show More Authors

Drones play a vital role in the fundamental aspects of Industry 4.0 by converting conventional warehouses into intelligent ones, particularly in the realm of barcode scanning. Various potential issues frequently arise during barcode scanning by drones, specifically when the drone camera has difficulty obtaining distinct images due to certain factors, such as distance, capturing the image whilst flying, noise in the environment and different barcode dimensions. In addressing these challenges, this study proposes an approach that combines a proportional–integral–derivative (PID) controller with image processing techniques. The PID controller is responsible for continuously monitoring the camera’s input, detecting the difference

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
Study ABO / Rh Systems with IL-18 & IL-33 in Iraqi Patients with Diabetes Mellitus Type II
...Show More Authors

Type 2 diabetes mellitus (DM) is a group of metabolic disorder disease. The inflammatory markers act as a new risk factor for development of type 2 diabetes with a possible association with ABO/Rh blood groups. Human ABO genes are located on chromosome 9q34.1-q34.2. The aim of this study was to investigate the possible association between inflammatory markers, interleukin (IL) -18 and IL-33 in type 2DM and ABO blood groups. Sixty four patients with newly diagnosed type2 DM and control group consist of twenty healthy Iraqi individual. Laboratory test were include ABO blood groups using standard serological procedures and detection IL-18 and IL-33 in serum by ELISA kits. The Present data showed a significant increase i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 01 2015
Journal Name
Journal Of Engineering
A Spike Neural Controller for Traffic Load Parameter with Priority-Based Rate in Wireless Multimedia Sensor Networks
...Show More Authors

Wireless Multimedia Sensor Networks (WMSNs) are a type of sensor network that contains sensor nodes equipped with cameras, microphones; therefore the WMSNS are able to   produce multimedia data such as video and audio streams, still images, and scalar data from the surrounding environment. Most multimedia applications typically produce huge volumes of data, this leads to congestion. To address this challenge, This paper proposes Modify Spike Neural Network control for Traffic Load Parameter with Exponential Weight of Priority Based Rate Control algorithm (MSNTLP with EWBPRC). The Modify Spike Neural Network controller (MSNC) can calculate the appropriate traffi

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 29 2025
Journal Name
Clean Energy Science And Technology
Edge-intelligent leak detection in water distribution systems using CatBoost: A sustainable solution for reducing infrastructure losses
...Show More Authors

Water supply networks are marred by serious risks of imperceptible pipeline leakage, posing ‎sustainability ‎and ‎performance ‎threats.  This article highlights the use of vibratory signal features to get around the drawbacks of traditional methods in a highly detailed framework for leak detection based on CatBoost. demonstrated excellent diagnostic performance and carried out a thorough test performance evaluation on five leakage configurations  . The expected system achieved an accuracy of 98.1% (variance (well within x/3% of expected):, beating traditional competitors such as Random Forest (97.3%) and Support Vector Machine (93.8%). ‎For example, the area under the receiver-operating characteristic curve was 0.995, in

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Thu Jun 30 2022
Journal Name
International Journal Of Drug Delivery Technology
New Metal Complexes Derived from Heterocyclic Schiff-base Ligand; Preparation, Structural Investigation and Biological Activity
...Show More Authors

The formation of a Schiff-base with N2O2 donor atoms derived from the hydrazine segment and its metal complexes are reported. The Schiff-base ligand; N’-((1R,2S,4R,5S,Z)-2,4-diphenyl-3-azabicyclo[3.3.1]nonan-9-ylidene)furan-2-carbohydrazide (HL) was prepared from the reaction of furan-2-carbohydrazide with (1R, 2R, 4R, 5S)-2,4-diphenyl-3-azabicyclo[3.3.1]nonan-9-one (M1) in ethanol medium. The reaction of the title ligand with selected metal ions Cr(III), Mn(II), Ni(II), Cu(II), Zn(II) and Cd(II) gave complexes with the general formula [M(L)Cl2], (where: M = Cr(III), Mn(II), Ni(II), Cu(II), Zn(II) and Cd(II)). Spectroscopic analyses Fourier transform infrared (FT-IR), Nuclear Magnetic Resonance (NMR) Carbon-13 nuclear magnetic res

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref