Islamic law has relied on a number of sources in order to denote the rulings issued by them, including what is original and what is sub, and it is known to all scholars, that the Prophet's Sunnah is the second major source after the Koran, which separated the overall and devoted its year and restricted absolute. God Almighty obeyed the owner and his followers, and that his obedience of obedience to God Almighty said: (Who obeys the messenger has obeyed God) (women: 80), and then between the peasant who believes in him and his victory and follow him, he said: (and he said: And the one who was revealed with them were the successful ones (al-A'raf: 157).
It is known that the Sunnah commanded to follow is the correct fixed about him (), unlike the weak return and tracker of the history of the year finds that scientists, has dealt with most of its conversations criticism and scrutiny on the foundations of wound and amendment, to distinguish the true hadith of weak, because the acceptance of the Hadith is based on It is free from the ominous cause, hence the deep interest of scientists in the bug, to enable the people of modern competence and industry to stand on its reality, and to have a rule through which they distinguish the true talk of the weak, and may God Almighty to help me systems of what is often called modern Among the types of hadiths that were ailments, it weakened them, so I wished to study them in practice by examining its names (the cause and its problems when modernized through the epistemological systems). The nature of this research necessitated that the research should include after the introduction to the preface, researchers and conclusion, mentioned in the introduction the importance of the topic and the reason for writing it and the purpose of it, and dealt with in the introduction definition of the cause, types and manifestations, and known systems needles Names and reasons for their systems, and then provided full maturity, and devoted the first topic to talk about the ills contained in the bond, reinforcing them with practical examples, and made the second section of the ills contained in the bond and the body together with their practical examples.
Background: The skull offers a high resistance of adverse environmental conditions over time, resulting in the greater stability of the dimorphic features as compared to other skeletal bony pieces. Sex determination of human skeletal considered an initial step in its identification. The present study is undertaken to evaluate the validity of 3D reconstructed computed tomographic images in sex differentiation by using craniometrical measurements at various parts of the skull. Materials and Method: 3D reconstructed computed tomographic scanning of 100 Iraqi subject, (50 males and 50 females) were analyzed with their age range from20-70 years old. Craniometrical linear measurements were located and marked on both side of the 3D skull images.
... Show MoreObjective(s): To evaluate and compare between Health Promotion Program for the Prevention of Epidemics at Primary Health Care Centers in Baghdad City.
Methodology: A descriptive study, using the evaluation and comparative approaches, is conducted to evaluate health promotion program for the prevention of epidemics at primary health care centers in baghdad city from October 15th 2019 through March 1st 2020. A purposive, non-probability, sample of (42) health promotion unit officers were recruited from the same number of primary health care centers which were divided into (14) main, (14) sub and (14) family medicine primary health care centers i
... Show MoreThe current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show MoreThe Ottomans ruled Turkey for nearly six centuries, during which the Ottoman Empire passed through varying periods in terms of strength, influence, and the area of land they ruled. In the last decade of its rule, the Ottoman Empire was severely weakened in all political, military, administrative and economic aspects. In addition to the internal strife that was stirred up by the leaders of the Association (Union and Progression), that organization that led the coup movement against the Ottoman Empire later.
After the abolition of the Sultanate and the proclamation of the Turkish Republic, the social fabric in Turkey changed, and many customs and traditions alien to it emerged to society. One of the thing
... Show Moreالوصف A simple chemistry method approach was used to synthesise new ligand derivate from L-ascorbic acid and its complexes. All of them were water-soluble and are used quite extensively in the medical and pharmaceutical fields. This study synthesised the new ligand derivative from L-ascorbic acid-base using the following steps: A 5, 6-O-isopropylidene-L-ascorbic acid was prepared by reacting dry acetone with L-ascorbic acid followed by reacting it with trichloroacetic acid to yield [chloro (carboxylic) methylidene]-5, 6-O-isopropylidene-L-ascorbic acid in the second stage. In the third stage, the derivative was reacted with (methyl (6-methyl-2-pyridylmethyl) amine to create a new ligand (ONMILA). This novel ligand was identified using
... Show MoreA simple chemistry method approach was used to synthesise new ligand derivate from L-ascorbic acid and its complexes. All of them were water-soluble and are used quite extensively in the medical and pharmaceutical fields. This study synthesised the new ligand derivative from L-ascorbic acid-base using the following steps: A 5,6-O-isopropylidene-L-ascorbic acid was prepared by reacting dry acetone with L-ascorbic acid followed by reacting it with trichloroacetic acid to yield [chloro(carboxylic)methylidene]-5,6-O-isopropylidene-L-ascorbic acid in the second stage. In the third stage, the derivative was reacted with (methyl(6-methyl-2-pyridylmethyl)amine to create a new ligand (ONMILA). This novel ligand was identified using a number
... Show MoreA novel azo dye ligand namely (2-(pyridin-3-yldiazenyl)naphthalen-1-ol (HPYNA), was synthesized by the coupling reaction of diazonium salt of 3-aminopyridine with naphthol. The palladium(II) complex for HPYNA ligand was prepared by reacting palladium(II) ions with the HPYNA ligand. These synthesized compounds were characterized using different techniques, including mass, 1H-NMR, infrared, and UV-Vis spectroscopy. The infrared results show that the azo ligand reacts as a bidentate via the oxygen atom of phenol and nitrogen atom of the azo group. The palladium(II) complex is square-planer with diamagnetic properties depending on the results of electronic transitions and magnetic sensitivity. The HPYNA ligand and palladium complex show
... Show MoreIn this research, the semiparametric Bayesian method is compared with the classical method to estimate reliability function of three systems : k-out of-n system, series system, and parallel system. Each system consists of three components, the first one represents the composite parametric in which failure times distributed as exponential, whereas the second and the third components are nonparametric ones in which reliability estimations depend on Kernel method using two methods to estimate bandwidth parameter h method and Kaplan-Meier method. To indicate a better method for system reliability function estimation, it has be
... Show MoreThe modern steer-by-wire (SBW) systems represent a revolutionary departure from traditional automotive designs, replacing mechanical linkages with electronic control mechanisms. However, the integration of such cutting-edge technologies is not without its challenges, and one critical aspect that demands thorough consideration is the presence of nonlinear dynamics and communication network time delays. Therefore, to handle the tracking error caused by the challenge of time delays and to overcome the parameter uncertainties and external perturbations, a robust fast finite-time composite controller (FFTCC) is proposed for improving the performance and safety of the SBW systems in the present article. By lumping the uncertainties, parameter var
... Show MoreCryptography is the technology of protecting information and communication by means of encoding the sending information. Existing methods often operate within predetermined mathematical structures which can be subject to pattern recognition and which are lack biological randomness. To address these challenges, this paper introduced a new bio-inspired cryptography approach to protect text messages using the coding mechanisms of DNA and RNA materials. The encryption system consists of six steps: encoding the plaintext message into DNA sequences, transcribing DNA into RNA, applying the complementary base pairing, scrambling RNA segments, optional reverse transcription, and encoding the resulting DNA-RNA characters into ciphertext. Rand
... Show More