Islamic law has relied on a number of sources in order to denote the rulings issued by them, including what is original and what is sub, and it is known to all scholars, that the Prophet's Sunnah is the second major source after the Koran, which separated the overall and devoted its year and restricted absolute. God Almighty obeyed the owner and his followers, and that his obedience of obedience to God Almighty said: (Who obeys the messenger has obeyed God) (women: 80), and then between the peasant who believes in him and his victory and follow him, he said: (and he said: And the one who was revealed with them were the successful ones (al-A'raf: 157).
It is known that the Sunnah commanded to follow is the correct fixed about him (), unlike the weak return and tracker of the history of the year finds that scientists, has dealt with most of its conversations criticism and scrutiny on the foundations of wound and amendment, to distinguish the true hadith of weak, because the acceptance of the Hadith is based on It is free from the ominous cause, hence the deep interest of scientists in the bug, to enable the people of modern competence and industry to stand on its reality, and to have a rule through which they distinguish the true talk of the weak, and may God Almighty to help me systems of what is often called modern Among the types of hadiths that were ailments, it weakened them, so I wished to study them in practice by examining its names (the cause and its problems when modernized through the epistemological systems). The nature of this research necessitated that the research should include after the introduction to the preface, researchers and conclusion, mentioned in the introduction the importance of the topic and the reason for writing it and the purpose of it, and dealt with in the introduction definition of the cause, types and manifestations, and known systems needles Names and reasons for their systems, and then provided full maturity, and devoted the first topic to talk about the ills contained in the bond, reinforcing them with practical examples, and made the second section of the ills contained in the bond and the body together with their practical examples.
In the present study, magnet silica-coated Ag2WO4/Ag2S nanocomposites (FOSOAWAS) were fabricated via a multistep method to address the drawbacks related to single photocatalysts (pure Ag2WO4 and pure Ag2S) and to clarify the significant influence of semiconductor heterojunction on the enhancement of visible-light-driven organic degradation. Different techniques were performed to investigate the elemental composition, morphology, magnetic and photoelectrochemical properties of the fabricated FOSOAWAS photocatalyst. The FOSOAWAS photocatalyst (1 g/L) exhibited excellent photodegradation efficiency (99.5%) against Congo red dye (CR = 20 ppm) after 140 min of visible-light illumination. This result confirmed the ability of the heterojunction be
... Show MoreBacteriocin is an important antimicrobial peptide that can be used in industrial and medical fields due to its characteristics of antibacterial, food preservation and anticancer activities. Fifty isolates of Bacillus sp were collected from different soil samples which were already recognized via morphological and biochemical identification process. The isolates were screened for bacteriocin production effective against Staphylococcus spp in order to select the highest producing isolate. The isolate NK16 showed the maximum bacteriocin production (80 AU/ml) which was further characterized as Bacillus subtilis NK 16 through using API identification system (API 20E and API 50CHB). Then, next step was to detect the optimal conditions for maximum
... Show MoreThis study uses an environmentally friendly and low-cost synthesis method to manufacture zinc oxide nanoparticles (ZnO NPs) by using zinc sulfate. Eucalyptus leaf extract is an effective chelating and capping agent for synthesizing ZnO NPs. The structure, morphology, thermal behavior, chemical composition, and optical properties of ZnO nanoparticles were studied utilizing FT-IR, FE-SEM, EDAX, AFM, and Zeta potential analysis. The FE-SEM pictures confirmed that the ZnO NPs with a size range of (22-37) nm were crystalline and spherical. Two methods were used to prepare ZnO NPs. The first method involved calcining the resulting ZnO NPs, while the second method did not. The prepared ZnO NPs were used as adsorbents for removing acid black 210
... Show MoreThis study aimed to identify and describe one of the bacterial feeder nematode Acrobeloides varius Kim, Kim and Park, 2017 (Rhabditida, Cephalobidae), which was isolated from soil samples that were collected from Baghdad, central of Iraq, and was classified using both morphological and molecular criteria. All specimens of A. varius were cultured, identified and described using morphometric criteria. Selected specimens (Zah. IRQ3 OR994579.1 isolate) of this species were characterized by having the body length of the male ranging from (184.94 – 221.72 μm), the body length of the female ranging (507.38 – 521.92 μm) and the body length of the juvenile ranging from (355.53 – 490.35 μm). Selected specimens of this species were m
... Show MoreIn this study, from a total of 856 mastitis cases in lactating ewes, only 34 Streptococcus agalactiae isolates showed various types of resistance to three types of antibiotics (Penicillin, Erythromycin and Tetracycline). St. agalactiae isolates were identified according to the standard methods, including a new suggested technique called specific Chromogenic agar. It was found that antibiotic bacterial resistance was clearly identified by using MIC-microplate assay (dilution method). Also, by real-time PCR technique, it was determined that there were three antibiotics genes resistance ( pbp2b, tetO and mefA ). The high percentage of isolate carried of a single gene which was the Tetracycline (20.59%) followed by percentage Penicillin was
... Show MoreOptical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm
... Show More