The research in Islamic history is considered a title for the glory of the nation and a mirror for the intellectual and mental maturity of the men of the Islamic state who played an important role in saving humanity from darkness to light and from ignorance to knowledge and to show their position in building the Islamic state, and to highlight the importance of their conquests of neighboring cities and the expansion of Islam, and for this reason they appear The importance of writing on the topic (The Battle of Dumat al-Jandal and its impact on the era of the Prophethood and the Rightly Guided Caliphate). The reason for choosing this topic was to show the status of Dumat al-Jandal and its importance in the Islamic state and its great role in driving away the specter of the Byzantine enemy that was threatening the Islamic state at the time.
The Southern Cowpea Beetle Callosobruchus maculatus (F.) is one of the most widespread insect pests of stored legumes, causing a considerable loss during storage, decreasing the net weight of the crops, and resulting in reduced the quality of the crops. This study has been conducted to determine the lifetime, fertility and life table parameters of C. maculatus by using an alkaloids extract from Moringa oleifera leaves at different concentrations 1000, 2000, and 3000 ppm. The result was shown that the lowest survival rate was 49% at a concentration of 1000, 2000 ppm, as compared with the control which was 77%. The lowest reproductive rate (Ro) was 4.76 female/female/generation at the concentration of 1000 ppm, c
... Show MoreThe most significant function in oil exploration is determining the reservoir facies, which are based mostly on the primary features of rocks. Porosity, water saturation, and shale volume as well as sonic log and Bulk density are the types of input data utilized in Interactive Petrophysics software to compute rock facies. These data are used to create 15 clusters and four groups of rock facies. Furthermore, the accurate matching between core and well-log data is established by the neural network technique. In the current study, to evaluate the applicability of the cluster analysis approach, the result of rock facies from 29 wells derived from cluster analysis were utilized to redistribute the petrophysical properties for six units of Mishri
... Show MoreThis study was aimed to explore the impact of social concepts about tribe, clan and women, on internal audit performance. These concepts are considered to be components of the organizational culture and performance of internal audit practice, with respect to the individual and collective performance within the institution. The study, furthermore, was intended to investigate and understand the role of the organizational culture of the tribal, clan and women components with regard to their role in society, in Qatar.
To achieve these objectives, the researcher followed the descriptive analytical approach, using a questionnaire directed to experts and staff working in the banking sector, with the view to test
... Show MoreThe study aimed to investigate the relationship between empowerment strategies and their impact on the success of enrichment work, it included the dimensions of empowerment strategies (power, knowledge, information, rewards), The dimensions of Job enrichment are (Skill variety, Task identity, Task significance, Autonomy, Feedback). The study was conducted at the headquarters of the Iraqi Oil Ministry in Baghdad and was based on a sample of the leadership of the ministry of managers consisting of 215 people. The data were collected using the questionnaire method based on scientific standards adopted in previous st
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreThe research discusses two variables are important, orientation marketing and quality of service, and that the purpose of the research is to see whether the telecom companies applied orientation marketing or not and to what extent is keen to apply it to suit the Iraqi environment as it has been applied research in kork Telecom company and Asia Cell Telecom are sectors service job in the business sector in Iraq, The information was obtained through the design of the questionnaire compatible runway Likert, and distribution (92) questionnaire, which (50) for the company Korek Telecom and (42) of the Asia-Cell, research population sample included a number of staff in the departments and units in the two companies, it has been support
... Show MoreThe current study aims to develop a proposed educational program based on augmented reality (AR) technology, in addition to assessing its effectiveness in developing research and historical imagination skills of the Humanities Track's female students at the secondary stage, as well as assessing the correlative and predictive relationships between the amount of growth for the two dependent variables. To achieve this, a secondary school in the city of Makkah Al-Mukarramah was chosen, and an available random sample of (30) female students from the study population was selected. The quasi-experimental approach was followed by this study, particularly one group design. In addition, two tools were used to collect study data, namely: a test of
... Show MoreEach school of Islamic jurisprudence has principles and rules upon which the diligent work in these schools is based. This is due to the view of sanctification of these rulings, as they are divine rulings. Therefore, the goal is to reach a ruling that represents the intent of the legislator as much as possible.
Hence, these schools of thought established rules for issuing fatwas with the intention of restricting the performance of a fatwa to the hands of those who are qualified for it and have met its conditions, so they gave priority to the most knowledgeable person over others to perform the fatwa. In the Hanafi school of thought, for example, the saying of Imam Abu Hanifa (may God have mercy on him) is given precedence over others,
Allah the Almighty has honored many of his slaves in the high houses for their efforts in building the scientific edifice of this nation, by demonstrating what is needed from the legal provisions for all the relations between them, and the actions that they emanate from. The tasks of the abbreviations and Almstsot, and deposited in the mabahith after various investigations and precious precious matters and showed all the human needs in his life and what is expected to happen, even on the rarest possibilities, and their efforts that left the nation on the cases of Goliath. , And Ask They are in Dar dignity with the best creatures and make us a share of those good things, and Odamna to obey Him and His pleasure until death, and forgive us
... Show MoreThe main aim of the research is to identify the impact of the application of IFRS for SMEs on optimizing the utility of information for financial reports. To answer the questions and test the hypotheses of the research, researchers relied on the descriptive analytical approach. First, the researchers clarified the theoretical aspect through previous studies, and then they analyses d the results of the applied study by testing the hypothesis using the SPSS.
A questionnaire was distributed after evaluation and arbitration by a number of specialists on selected sample. The sample of 120 respondents consists of general managers, department directors, head of departments, accountants, auditors and financial controllers working in the
... Show More