Besides the role of state institutions that come in the forefront of their priorities and obligations to provide security and development of the economy and reduce the unemployment rate and the reduction of inflation and improving education, health and others, the Community Partnership At frames what has become known as the institutions of society civil-with the state does not eliminate the role, but rather complements its role ; it is the role of civil society partner and an extension of the role of the state in the face of challenges and crises, but it may be sometimes a race role in addressing social, political and economic issues of the role played by the state, not complementary.
The highlighting the specificity of the relationship between the youth site within the institutions of civil society and development highlights the importance of the role of these institutions in the rehabilitation of young leaders in various fields, and to raise the sense of national belonging, and the establishment of democracy and respect for human rights values, and then enable the integration into the overall development paths.
مشكلة البحث :
تعد الادارة الجامعية عاملا مهما واساسيا في اكمال البناء المعرفي لشخصية الطالب الجامعي لما يمثله من قدرة على قيادة العملية التربوية والتعليمية والوصول بها الى تحقيق اهدافها . وطالما كانت هذه الادارة ممثلة ابتداء من رئاسات الاقسام ووصولا الى اعلى الهرم الاداري في الجامعة مهمة في تحقيق الاهداف العلمية والتربوية فان اختيار الاشخاص للقيام بمهامها تاخذ جانبا كبيرا ومهما وذلك للاثر
... Show MoreThis study aims to find out the impact of activities office provided to kindergarten children in the development of creativity in linguistic performance goal of capabilities (fluency, flexibility and originality) through the application of the test configuration Algheih Children Riyadh, which consists of (70) Single to measure the skills of language arts four a listening and speaking and a willingness to read and prepare for writing, was applied (30) Single of language arts, listening and speaking in this research, and was the correlation coefficient for the hearing (0.78) and for speaking was (0.61) has been extracted stability of the scale using the equation Alvakronbach the value of (0.73).
The proper
... Show MoreThe research included an introduction, and three functions
of the Prophet (peace and blessings of Allaah be upon him), a
machine and a companion, and a conclusion , the first function,
which is zakaah, and began with it because it is the basis of every
work, no work is accepted by Allaah except what was sincere to
him, as well as sincere intention, because accepting works is
entrusted with the
The research aims at defining the level of the school environment and the social adjustment of the sample due to the sex and the relation among them. The two researchers have stated the school environment scale counting on the theoretical background and previous studies. As for the social adjustment scale, the researchers have used the scale of (Al-Kindy, 2001) and the school environment scale is implicated on (112) students. The schools and the students were elected in a random way. Whereas the social adjustment scale is implicated on (30) teachers in order to know their ratio of the student's adjustment. The results have appeared the satisfaction of the students on the private school environment within their school aspects (the directo
... Show Moreالمقدمة
تمثل الأسعار تعبيرا" نقدياً لقيمة السلع والخدمات المقدمة للزبون، وتعد عملية التسعير من العمليات المهمة وذات الأثر البالغ على نجاح واستمرار منظمات الأعمال، نظراً لما لها من تأثير على المقدرة الربحية وإعادة توزيع الدخل القومي المخصص للاستهلاك، إذ أنه بتحديد الأسعار يستطيع الفرد أن يوزع دخله بين ما يعده ضرورياً من السلع وما يعد كمالياً.
وعموماً فإن لعملية التسعير م
... Show MoreFinger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network
... Show MorePVC membrane sensor for the selective determination of Mefenamic acid (MFA) was constructed. The sensor is based on ion association of MFA with Dodecaphospho molybdic acid (PMA) and Dodeca–Tungstophosphoric acid(PTA) as ion pairs. Nitro benzene (NB) and di-butyl phthalate (DBPH) were used as plasticizing agents in PVC matrix membranes. The specification of sensor based on PMA showed a linear response of a concentration range 1.0 × 10–2 –1.0 × 10–5 M, Nernstian slopes of 17.1-18.86 mV/ decade, detection limit of 7 × 10-5 -9.5 × 10 -7M, pH range 3 – 8 , with correlation coefficients lying between 0.9992 and 0.9976, respectively. By using the ionphore based on PTA gives a concentration range of 1.0 × 10–4 –1.0 × 10–5 M,
... Show MoreIn digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreHysterectomy is one of the most common gynecological operations done worldwide. Early diagnosis of the psychosexual effects of a hysterectomy and the fast application of appropriate treatment can prevent further worsening and persistence of symptoms, especially with respect to higher levels of anxiety, depression, lower self-esteem, and sexual impact after a hysterectomy. The aim of this study was to assess the psychological and sexual problems of women with hysterectomy. A descriptive study was carried out from March 1, 2023 to May 25, 2023 to determine the level of psychosexual problems experienced by women after hysterectomy. A purposive (non-probability) sample of 120 women who visited the outpatient clinic at Baghdad Teaching H
... Show More