Research Summary
The research revolves around the collection of pending hadiths on Abdullah bin Amr bin Al-Aas, may God be pleased with them, and it is required in these hadiths that they be among those in which there is no room for diligence, such as telling about unseen matters, signs of the Hour, or a statement of virtue and reward for obedience, or punishment for disobedience.
The research consists of an introduction, two topics, and a conclusion of the first topic in the translation of Abdullah bin Amr bin Al-Aas, and the second topic, the pending hadiths of Abdullah bin Amr bin Al-Aas, may God be pleased with them, in which there is no room for diligence in collecting and studying
At the end of this rese
يناقش البحث المقومات المادية والمجتمعية والموضوعية للدور الاقليمي العراقي بعد العام 2010 والفرص المتاحة والقيود التي تحد منه والافاق المستقبلية لهذا الدور في ظل بيئة اقليمية تسودها منظومات تحالف متناقضة في الاهداف والاستراتيجيات
Abstract
This study aimed to identify the business risks using the approach of the client strategy analysis in order to improve the efficiency and effectiveness of the audit process. A study of business risks and their impact on the efficiency and effectiveness of the audit process has been performed to establish a cognitive framework of the main objective of this study, in which the descriptive analytical method has been adopted. A survey questionnaire has been developed and distributed to the targeted group of audit firms which have profession license from the Auditors Association in the Gaza Strip (63 offices). A hundred questionnaires have been distributed to the study sample of which, a total of 84 where answered and
... Show MoreThis study aimed at identifying how children express the emerging coronavirus in general and according to their age groups (4-13 years) by analyzing 91 of their drawings published online, using the descriptive content analytical approach. The results showed that children's artistic expression of the virus came according to the concepts and ideas they carried about the virus for the age groups of (4-7 years) and (7-9 years), while it came according to visual perception for age groups (9-11 years), and from (11-13) years. Also, most children were aware about the presence of the virus and its widespread around the world, but (99%) of them do not realize the seriousness of the virus. It was confirmed that between (25-34%) of children were su
... Show MoreThis article presents and explores the theoretical aspect in the use of Arab Islamic theme by the western writers to obtain and achieve individual motives. In this study the model for the theory of Arab presence in Andalusia , through the book entitled “ Alhamra” by the English writer Washington Erving ,was analyzed.
The most important results in this research: the success of the author in the employment of the Islamic history in the formation of the first American legend, Columbus legend, through the selection of the right thoughts to establish his American National theory. The author compared between the Andalusia experience and the Arab occupation to Spain and the American conquest of the new
... Show MoreThe research aims to recognize the impact of the training program based on integrating future thinking skills and classroom interaction patterns for mathematics teachers and providing their students with creative solution skills. To achieve the goal of the research, the following hypothesis was formulated: There is no statistically significant difference at the level (0.05) between the mean scores of students of mathematics teachers whose teachers trained according to the proposed training program (the experimental group) and whose teachers were not trained according to the proposed training program (the control group) in Pre-post creative solution skills test. Research sample is consisted of (31) teachers and schools were distribut
... Show MoreThe interest of many companies has become dealing with the tools and methods that reduce the costs as one of the most important factors of successful companies, and became the subject of the attention of many economic units because of the impact on the profits of company, and since the nineties of the last century the researchers and writers gave great attention to this subject, especially in light of the large competition and rapid developments in cost management techniques, as well as the wide and significant change in production methods that have been directed towards achieving customer satisfaction, all this and more driven by economic units in all sectors whether it is service or productivity to find methods that would reduc
... Show MoreThe importance of research is to be considered by highlighting the tax policy in Iraq which extended for successive measurement of the amount of tax receipts for respective periods, the research problem represents security, economic and political issues that Iraq suffered which were very difficult since Nineties of the last century until now that led to a lake of clarity in tax policy trends, volatility in it and finally reflected on the tax revenues increase or decrease. One of the main recommendations of the research is: (The necessity to develop a deliberate strategy for tax policy in Iraq which should take into account financial, economic, and social goals in appropriate way).
This research includes an analytical and critique study for the version of the University Service Law No.23 for the year 2008, containing all its aspects and failure whether in its legislation or its applications.
Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm
... Show More