Both religions have urged (honoring parents and kin) through the texts that came in their original sources, as honoring parents means showing respect to them In word and deed, and carrying in our hearts an appreciation for their status, and God commands to honor parents; Becausee this is Important in the eyes of God that he includeincludeed it in the Ten Commandmen.
Foliar application and seed soaking has been used as a means of supplying supplemental doses of nutrients, plant hormones, stimulants, and organic components. the effects of these applications have included yield increases, and improved drought tolerance, and enhanced crop quality, so A field experiment was carried out during spring seasons in 2019 and 2020 for styding Seed soaking and Foliar Application of Ascorbic acid, Citric acid and Humic acid on Growth, Yield and Active Components IN Maize. Randomized complete block design in split plots arrangement was used with three replicates. Main-plots were for seeds soaking with ascorbic, citric (100 mg l-1) frequently and humic at (1 ml l-1). Sub-plots were for vegetative parts nutrition with
... Show MoreRG Majeed, AS Ahmed, Jornal of Al-Muthanna for Agricultural Sciences, 2023
Delays and disruption are a common issue in both community and personal building programs The problem exists all throughout the world, but it is particularly prevalent in Iraq, where millions of dollars are squandered each time as a outcome. Delays and interruptions may have serious consequences not just for Iraq's construction plans, but also for the country's economic and social status. While numerous studies have been conducted to investigate the factors driving delays and disruption in Iraqi construction projects, slight consideration has been given to by what means project management implements and approaches have affected the occurrence of project delays and disruption. After analyzing the crucial reasons for delays and instability in
... Show MoreThe emergence of mixed matrix membranes (MMMs) or nanocomposite membranes embedded with inorganic nanoparticles (NPs) has opened up a possibility for developing different polymeric membranes with improved physicochemical properties, mechanical properties and performance for resolving environmental and energy-effective water purification. This paper presents an overview of the effects of different hydrophilic nanomaterials, including mineral nanomaterials (e.g., silicon dioxide (SiO2) and zeolite), metals oxide (e.g., copper oxide (CuO), zirconium dioxide (ZrO2), zinc oxide (ZnO), antimony tin oxide (ATO), iron (III) oxide (Fe2O3) and tungsten oxide (WOX)), two-dimensional transition (e.g., MXene), metal–organic framework (MOFs), c
... Show MoreThe study aims to follow modern methods in teaching rhythmic gymnastics skills by directing learners to develop their perceptions and absorb what the world deals with today and develop intelligence among learners, the researchers searched for the strengths of the learner by providing them with an opportunity to form their kinetic formation, hence the problem came by introducing a method of self-intelligence and social to guide the learner in the search for ways and solutions to overcome boredom and economy Time and effort in the educational process in learning and give them the freedom to express their ideas And their skills and here came the role of social and self-intelligence to teach the individual and collective kinetic formati
... Show MoreSince I live in a society in which violence has become widespread, and killing among its own people flared up till they began to kill under the excuse of taking shelter, in these pages I would like to explain the status of taking shelter in the light of Islamic Law (Sharia), exploring scholars’ opinions in the legitimacy or illegitimacy of this issue according to the legal standards.
And, to acquaint people, and myself in the first place, with the true nature and the gravity of this issue; to expose it to those who are unaware of it; to remind those who are already aware of it. I would refute the fabrications, remove the suspicions which surround it untill it made the forbidden permissible; the wrong right. I would explain to those
How I was eager to research the ruling on three of the most dangerous types to Islam and Muslims (the heretic, the sorcerer, the innovator, and related terms).
Because it is the most dangerous deadly disease that destroys the hearts of Muslims, and may even expel a Muslim from the circle of Islam, and how many Muslims have done or committed such a thing without knowing it. Indeed, how many Muslims have left Islam and whose wife has abandoned him without realizing it, and among them are those who have committed it without knowing it. As well as related words associated with heresy.( )
Because people debated such matters between extremists and lenient ones, most of whom were extremists, and they did not reach a conclusion. So I decid
Deception is defined as a linguistic and non-linguistic behavior that is used in interaction in order to make the addressees believe what is believed to be false or lack evidence. McCornack (1992) classifies deception into four manipulative strategies (i.e., fabrication, distortion, equivocation and concealment), other scholars argue that deception encompasses the strategies of “fabrication (outright lying), equivocation (being vague and ambiguous), or concealment (with holding relevant information) Thus, the present study investigates the deception strategies and motives that are used by Johnny Depp and Amber Heard during their defamation trials. Qualitative and quantitative methods are employed when analyzing the data in question. Th
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show More