The concept of education is not actually restricted to children or school students, but rather every person should be educated and followed up if he is intended to grow and prove, with effort and time allocation as to fulfill that goal. Thus , the current paper aims to a thinking education and to educate that thinking in teacher and it is not new to deal with the personal characteristics of teacher in the different scientific , and educational researches . But ,these research did not address the necessity of acquiring the skill of thinking, especially as it affects teacher's presentation of the content of the curriculum or even content outside the curriculum, and therefore, there is no research that shows that the teacher’s acquisition of this skill and it is considered another approach to teach that to the students in an indirect and non-costly manner. (affected and affect). So this research referred to the development taking place in the field of education in the world, as a result of the clear interest in this skill, as well as a statement of the reasons that made it today a necessity and one of the basic components of the Iraqi educator’s personality, not unaware of drawing attention to the obstacles in front of his thinking interest to become a skill and a feature therein.
abstract:
Objectives: The study aims to reveal the approach of Imam Al-Salmi in the weighting between the apparently conflicting texts, and to show the extent of his agreement and disagreement with the rest of the fundamentalists, and does he have vocabulary that can be used to elicit legal rulings in modern contemporary issues?
Method: The method of induction and analysis is one of the main tools to reach the research results. The study resorted to following the sayings of Imam Al-Salmi in various sources and fatwas and standing on them, then analyzing and applying them to the various branches of jurisprudence in the various jurisprudential chapters.
... Show MoreAn in-depth experimental study of the matrix effect of antifreeze (ethylene glycol) and water contamination of engine oil through FT-IR spectroscopy. With a comparison of the percent by volume concentration of contaminated fresh 15W-40 engine oil, there appeared to be a noticeable reduction in the O–H stretching signal in the infrared spectrum when ethylene glycol based antifreeze was included as a contaminant. The contaminants of distilled water, a 50/50 mixture of water and commercial ethylene glycol antifreeze, and straight ethylene glycol antifreeze were compared and a signal reduction in the O–H stretch was clearly evident when glycol was present. Doubling the volume of the 50/50 mixture as compared to water alone still res
... Show MoreCatalytic wet air oxidation of aqueous phenol solution was studied in a pilot plant trickle bed reactor using copper
oxide catalyst supported on alumina and silica. Catalysts were prepared by impregnating method. Effect of feed solution
pH (5.9, 7.3, and 9.2), gas flow rate (20%, 50%, 80%, and 100%), WHSV (1, 2, and 3 h-1), temperature (120°C, 140°C,
and 160°C), oxygen partial pressure (6, 9, 12 bar), and initial phenol concentration (1, 2, and 4 g/l).Generally, the
performance of the catalysts was better when the pH of feed solution was increased. The catalysts deactivation is related
to the dissolution of the metal oxides from the catalyst surface due to the acidic conditions. Phenol oxidation reaction
was strongly
:الملخص/كلية التربية هدف البحث الكشف عن التدريس الفاعل لأساتذة الكيمياء( . /ابن الهيثم، من وجهة نظر الطلبة وتكونت عينة البحث من للعلوم الصرفة80)طالبا( من طلبة قسم الكيمياء وللصفوف الأربعة في القسم، وتم تقويم50)أستاذا جامعيامن أساتذة القسم، واستخدم المنهج الوصفي في تحليل بيانات هذا البحث، وكذلك(علي الأزيرجاوي، استخدم مقياس التدريس الفاعل الذي أعده2010)بعد التحقق منصدقه وثباته، وقد أظهرت نتائج البحث أن متوسط درجا
... Show MoreThe capital banking foundation stone upon which the bank in the practice of business activities, the more capital a good financial adequacy of the increased bank's ability to grant credit and expand the various activities and provide a safety element for depositors and other sources of funding to achieve profits and increase the trading volume of the shares, causing the rise the rate of return for the shares of banks and have the Central Bank as head of the banking system by issuing instructions capital increase banking, according to the requirements of economic development and increase gross domestic product by supporting investment projects that are financed through banks, the research aims to show the extent of the banks commitment to
... Show MoreAbstract:
The research aims to identify the concept of trading securities in Iraq and to propose a new mechanism for the taxation of trading profits and the extent of its impact on tax revenues, as it was observed that there are professional investors in the trading market and some of them achieve huge annual profits. and this profit should be like other taxable profits. The General Commission of Taxes and in cooperation with the Iraq Stock Exchange should identifying those profits, subjecting them to income tax, and adding them to the tax base. The researcher relied on the use of the descriptive and analytical approach bas
... Show MoreIn this paper, we will study non parametric model when the response variable have missing data (non response) in observations it under missing mechanisms MCAR, then we suggest Kernel-Based Non-Parametric Single-Imputation instead of missing value and compare it with Nearest Neighbor Imputation by using the simulation about some difference models and with difference cases as the sample size, variance and rate of missing data.
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the