This research was from an introduction, three topics and a conclusion, as follows:
The first topic: the concept of Islamic banks and their emergence and development, which includes three demands are:
The first requirement: the concept of Islamic banks and types, and there are two requirements:
* Definition of Islamic banks language and idiom.
* Types of Islamic banks.
The second requirement: the emergence and development of Islamic banks.
Third requirement: the importance of Islamic banks and their objectives.
We learned about the concept of banks and their origins and how they developed and what are the most important types of Islamic banks
The second topic: Formulas and sources of financing in Islamic banks and the services they provide, which includes three demands are:
The first requirement: Formulas of financing in Islamic banks and jurisprudence graduates.
The second requirement: sources of financing in Islamic banks.
Third requirement: Services provided by Islamic banks.
In this topic, it became clear the most important pillars of Islamic banks, namely the forms and sources of financing and services provided by these banks, which distinguishes them from traditional banks or capitalism.
Conclusion, conclusions and recommendations.
A disagreement has arisen among scholars regarding the ruling on historical statues and monuments in Muslim countries, especially after the Taliban blew up some huge historical statues, and we have witnessed different positions that reach the point of contradiction, each claiming to be right, and now that the crisis has passed and the intensity of the dispute has subsided, I see It is appropriate to discuss this issue calmly, without drifting behind this or that party, to find out the legal position on these statues and monuments.
I presented the most prominent modern opinions related to the subject and discussed them in this research, which I called (Sharia’s position on historical statues and monuments), in which I tried to reach
Abstract In this work we introduce the concept of approximately regular ring as generalizations of regular ring, and the sense of a Z- approximately regular module as generalizations of Z- regular module. We give many result about this concept.
In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreAA Al-Nuaimy, Iraqi J Comm Med, 2008 - Cited by 3
Energy is one of the components of the national security of countries and is of particular importance to the industrialized countries, including Germany. Energy policy includes many areas and has an impact on various sectors such as the environment, climate, agriculture and others. During the past few years, Germany has witnessed many transformations, the most important of which is the energy transition towards renewable energy, and it was strengthened in the strategy that was It was developed in 2010, which aims to achieve a long-term energy transformation, and sales of the German energy technology sector have evolved from 2010 to 2020, and this issue is related on the other hand to the concept of energy security and because of its strateg
... Show MoreVehicular ad hoc network (VANET) is a distinctive form of Mobile Ad hoc Network (MANET) that has attracted increasing research attention recently. The purpose of this study is to comprehensively investigate the elements constituting a VANET system and to address several challenges that have to be overcome to enable a reliable wireless communications within a vehicular environment. Furthermore, the study undertakes a survey of the taxonomy of existing VANET routing protocols, with particular emphasis on the strengths and limitations of these protocols in order to help solve VANET routing issues. Moreover, as mobile users demand constant network access regardless of their location, this study seeks to evaluate various mobility models for vehi
... Show MoreThe aim of this thesis is to introduce a new concept of fibrewise topological spaces which is said to be fibrewise slightly topological spaces. We generalize some of the main results that have been reached from fibrewise topology into fibrewise slightly topological space. We introduce the concepts of fibrewise slightly closed, fibrewise slightly open, fibrewise locally sliceable, and fibrewise locally sectionable slightly topological spaces. Also, state and prove several propositions related to these concepts. On the other hand, extend separation axioms of ordinary topology into fibrewise setting. The separation axioms are said to be fibrewise slightly T_0 spaces, fibrewise slightly T_1 spaces, fibrewise slightly R_0 spaces, fibrewise s
... Show MoreThe reinforcing effect of emphasizers can hardly be denied, hence their importance , hence the justification for writing this paper. As a particular type of adverbials , emphasizers form part of a major syntactic class. This study, thus, introduces the topic by first discussing a grammatical category characterized by being mobile and optional. The paper duly shows the scaling effect of emphasizers, their kinds and the transformational selectional rules that are operative in moving them to the right or left of the VP. It also handles their syntactic role as modifiers, their syntactic features,their occurrence or non- occurrence with negation and imperative and the position they occupy in the sentence. The paper also dwells on the agr
... Show MoreThe speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi
... Show MoreAbstract
Praise be to God, Lord of the Worlds, and prayers and peace be upon the most honorable of creation, Muhammad, whom God sent as a mercy to the worlds, and his infallible, pure, and pure family, and his faithful companions
I did not find anyone who studied stylistic structures except for one study, which is (The Literature of Imam Al-Jawad (peace be upon him), a stylistic study by the student Mina Reda Kazem, a master’s thesis), and it did not address the Hadi and the military men (peace be upon them) as the text of those texts. Coherently complementing each other.
I decided to stand by this heritage as a single text in a uniform period of time approximately from the year 195-260 AH, some
... Show More