Preferred Language
Articles
/
jcois-2032
Shariah ruling on advice
...Show More Authors

Abstract

Research title: The legal ruling of advice.

This research deals with the topic of advice, as the research included the following:

Preamble: I explained in it the meaning of advice in the Qur’an and Sunnah, and that what is meant by it is a good performance of the duty, then explaining its importance, importing it, and the difference between advice and what is similar to it, from enjoining good, denial, reproach and reprimand, backbiting and the will.

The first topic: It dealt with the ruling on advice, whether it is recommended or disliked, or forbidden, because what is meant by it is to give advice to others may be an obligation in kind, or it may be desirable or disliked, or forbidden.

The second topic: It includes a statement of the justifications for advice, which are specific to the discharge of liability, the protection of the honor of Sharia, the preservation of the legal necessities, and mercy with the advised.

And the third topic: a statement of the guidelines for advice, in which there are eleven controls.

And the fourth topic: It includes a statement of the types of advice with several considerations, namely: the advising carrier, the advised, the subject, and the method.

Keywords: advice - censure - defamation - the difference between advice and others - advice controls

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Apr 01 2021
Journal Name
Biochem. Cell. Arch
STUDY ON THE MUTATION OF ASXL1 IN ACUTE MYELOID LEUKEMIA IN IRAQI PATIENTS
...Show More Authors

The present study was designed to shed light on the molecular effects caused by acute myeloid leukemia (AML). It was also aimed to investigate ASXL1 point mutations in newly AML patients as compared to healthy control. The study comprised of 43 AML Iraqi patients and their ages ranged between 16-75 years. It included 23 females and 20 males compared with 20 healthy controls. Results revealed that the extracted DNA from 30 AML patients and amplified by PCR to obtain ASXL1 gene from exon 12 showed larger bands (479). Among forty three patients, two of them displayed point mutations of deletion and substitution, while the others were normal since no mutations were detected. The total of mutations in two mutated patients was 27 mutations, the m

... Show More
Preview PDF
Scopus (1)
Scopus
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Thu Apr 02 2020
Journal Name
Kufa Journal Of Engineering
PERFORMANCE OF SKIRTED CIRCULAR SHALLOW FOOTINGS RESTING ON SANDY SOIL UNDER INCLINED LOADS
...Show More Authors

Experimental tests were conducted to study the behavior of skirted foundations rested on dry medium sandy soil subjected to vertical and inclined loads. To achieve this goal, a small-scale physical model was designed and performed which contained an aluminum circular footing (100 mm) in diameter and (10 mm) in thickness and skirts with different heights, local medium poorly graded dry sand is placed in a steel soil container (2 mm) thick with internal dimensions (1000 mm x 1000 mm in cross section and 800 mm in height). The main objective of this study was to evaluate the response of skirt attached to the foundation at different skirt (L/D) ratios (0.0, 0.5, 1.0 and 1.5) and is subjected to point load at different angles of inclinat

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Sat Mar 01 2014
Journal Name
Renewable And Sustainable Energy Reviews
Review on the development of natural dye photosensitizer for dye-sensitized solar cells
...Show More Authors

View Publication
Scopus (372)
Crossref (349)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Civil Engineering Journal
Calibration of a New Concrete Damage Plasticity Theoretical Model Based on Experimental Parameters
...Show More Authors

The introduction of concrete damage plasticity material models has significantly improved the accuracy with which the concrete structural elements can be predicted in terms of their structural response. Research into this method's accuracy in analyzing complex concrete forms has been limited. A damage model combined with a plasticity model, based on continuum damage mechanics, is recommended for effectively predicting and simulating concrete behaviour. The damage parameters, such as compressive and tensile damages, can be defined to simulate concrete behavior in a damaged-plasticity model accurately. This research aims to propose an analytical model for assessing concrete compressive damage based on stiffness deterioration. The prop

... Show More
Scopus (33)
Crossref (30)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
THE EFFECTS OF BLOOD REHEOLOGICAL ON THE FLOW THROUGH AN AXISYMMETRIC ARTERIAL STENOSIS
...Show More Authors

The prediction of the blood flow through an axisymmetric arterial stenosis is one of the most important aspects to be considered during the Atherosclrosis. Since the blood is specified as a non-Newtonian flow, therefore the effect of fluid types and effect of rheological properties of non-Newtonian fluid on the degree of stenosis have been studied. The motion equations are written in vorticity-stream function formulation and solved numerically. A comparison is made between a Newtonian and non-Newtonian fluid for blood flow at different velocities, viscosity and Reynolds number were solved also. It is found that the properties of blood must be at a certain range to preventing atheroscirasis

View Publication Preview PDF
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Ecotoxicology And Environmental Safety
The role of environmental trace element toxicants on autism: A medical biogeochemistry perspective
...Show More Authors

View Publication Preview PDF
Crossref (31)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today: Proceedings
Response surface methodology: A review on its applications and challenges in microbial cultures
...Show More Authors

View Publication
Scopus (259)
Crossref (195)
Scopus Clarivate Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
An exploratory study of history-based test case prioritization techniques on different datasets
...Show More Authors

In regression testing, Test case prioritization (TCP) is a technique to arrange all the available test cases. TCP techniques can improve fault detection performance which is measured by the average percentage of fault detection (APFD). History-based TCP is one of the TCP techniques that consider the history of past data to prioritize test cases. The issue of equal priority allocation to test cases is a common problem for most TCP techniques. However, this problem has not been explored in history-based TCP techniques. To solve this problem in regression testing, most of the researchers resort to random sorting of test cases. This study aims to investigate equal priority in history-based TCP techniques. The first objective is to implement

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref