Values and ideals are two basic pillars in human life, and high societies have been keen throughout their ages to adhere to and establish them so that man can distinguish good and evil, right and wrong, as they are a balance of actions that give man a higher value. Many of the followers of Abbasid literature, poetry and prose – it is noted that many imams and writers have been keen to highlight these values and make them material for their poetry and literature, courage, generosity, chastity and....All meanings of human values and there is no doubt that one of the texts abounding in this field is what was reported from the people of the house of infallibility pure (peace be upon them), including we touch it in the visit of Imam Jaafar al-Sadiq (peace be upon him) to his grandfather Imam Hussein (peace be upon him) known as the visit of the forty, it has included ideals and values that guide us to adhere to faith in God Almighty and rely on him and renounce injustice and follow the passion and not to rely on the world and make it the end has embodied these values in the personality of Imam Hussein (peace be upon him).This is what we will try to highlight through the following axes: - 1- The first axis: resorting to God Almighty and believing in His mandate and caring for His honored servants who believed in their slavery to Him, so they were guardians who had the highest values of slavery and the like. 2- The second axis: describing the world and making it a means to reach the lofty values and not to rely on their decoration. 3- The third axis: rooting for innocence from the enemies of God Almighty, His Messenger and His guardians who want.4- The fourth axis: values and ideals in declaring the mandate and witnessing it to Imam Hussein through the representation of the verses of the Holy Qur'an.were
هدفت الدراسة الى التعرف على مستوى استخدام إدارة المعرفة و تكنولوجيا المعلومات لدى القيادات الإدارية تُعدّ لعبة الإسكواش من الألعاب الفردية، وواحدة من ألعاب المضرب، والتي تمتاز بالسرعة والحركة الدائمة في داخل القاعة، ولعل أهم ما يميز هذه اللعبة المتعة التي يشعر بها اللاعبون الممارسون لها، لأنها تجبر ممارسيها على الحركة المستمرة عن طريق تبادل لعب الكرة، وتتميز بالتحدي المباشر، وتتطلب اليقظة والحرص وال
... Show MoreSol-gel method was use to prepare Ag-SiO2 nanoparticles. Crystal structure of the nanocomposite was investigated by means of X-ray diffraction patterns while the color intensity was evaluated by spectrophotometry. The morphology analysis using atomic force microscopy showed that the average grain sizes were in range (68.96-75.81 nm) for all samples. The characterization of Ag-SiO2 nanoparticles were investigated by using Scanning Electron Microscopy (SEM). Ag-SiO2 NPs are highly stable and have significant effect on both Gram positive and negative bacteria. Antibacterial properties of the nanocomposite were tested with the use of Staphylococcus aureus (S. aureus) and Escherichia coli (E. coli) bacteria. The results have shown antibacteri
... Show MoreAbstract The research aims to identify the psychological and health risks that a child might be exposed to by playing with hazardous toys such as pellet guns. To this end, the researcher has visited Ian Al-Haytham Eye Hospital in Baghdad, the emergency department to figure out the rate of injuries in Children for the consecutive years (2017-2018) and the first Month of (2019). The psychological risks as a result of disability are represented by the inability to accommodate the surrounding environment well. Additionally, the child experiences a kind of tension, conflict, and going in psychological crises through introversion, isolation, withdrawal tendencies,
... Show MoreThis research depends on the relationship between the reflected spectrum, the nature of each target, area and the percentage of its presence with other targets in the unity of the target area. The changes occur in Land cover have been detected for different years using satellite images based on the Modified Spectral Angle Mapper (MSAM) processing, where Landsat satellite images are utilized using two software programming (MATLAB 7.11 and ERDAS imagine 2014). The proposed supervised classification method (MSAM) using a MATLAB program with supervised classification method (Maximum likelihood Classifier) by ERDAS imagine have been used to get farthest precise results and detect environmental changes for periods. Despite using two classificatio
... Show Moreيُعد التنمر ظاهرة إجتماعية قديمة موجودة في جميع المجتمعات سواء أكان المجتمع صناعيًا أم ناميًا، كما يُعد من المفاهيم الحديثة نسبيًا، وربما يرجع لحداثة الإعتراف به نوعًا من أنواع العنف فضلاعن ندرة الدراسات التي تناولته وعدم وجود معيار محدد لتحديد السلوك الذي يعد تنمرًا أم عابرًا، لقد بدأ الأهتمام بدراسة التنمر في سبعينات القرن الماضي وأصبح موضعًا يحضى بأهتمام العديد في مختلف البلدان، وفي عصرنا الحالي تطورت
... Show MoreВ статье рассматривается вопрос о связи флективных изменений с мыслительными процессами на материале русского и арабского языков, анализируются семантические, фонетические, морфологические и синтаксические основы фонограмматической когниции. Цель статьи выявление прямой связи между количественным звуковым изменением согласного состава слова и мыслительными процессами, с помощью которых человеческ
... Show MoreLet R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be approximately pure submodule of an R-module, if for each ideal I of R. The main purpose of this paper is to study the properties of the following concepts: approximately pure essentialsubmodules, approximately pure closedsubmodules and relative approximately pure complement submodules. We prove that: when an R-module M is an approximately purely extending modules and N be Ap-puresubmodulein M, if M has the Ap-pure intersection property then N is Ap purely extending.
Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreLet R be associative ring with identity and M is a non- zero unitary left module over R. M is called M- hollow if every maximal submodule of M is small submodule of M. In this paper we study the properties of this kind of modules.