The research in Islamic history is considered a title for the glory of the nation and a mirror for the intellectual and mental maturity of the men of the Islamic state who played an important role in saving humanity from darkness to light and from ignorance to knowledge and to show their position in building the Islamic state, and to highlight the importance of their conquests of neighboring cities and the expansion of Islam, and for this reason they appear The importance of writing on the topic (The Battle of Dumat al-Jandal and its impact on the era of the Prophethood and the Rightly Guided Caliphate). The reason for choosing this topic was to show the status of Dumat al-Jandal and its importance in the Islamic state and its great role in driving away the specter of the Byzantine enemy that was threatening the Islamic state at the time.
this research aims it measure the technical efficiency of the branches of the General Company for Land Transport, That scattered geographically at country level, by Data Envelopment analysis (DEA) technique, as this technique relies on measuring the efficiency of a set of asymmetric Decision making units, which is one of the nonparametric mathematical methods for and application related to Linear Programming, and this is what helps the General Company for Land Transport to diagnose its branches performance by benchmarking with each other and determine the performance gap. The research found that there is variation in the level of efficiency in the company's branches
شغلت قضية اعداد المعلم اهتمامات العديد من المسؤولين في قطاع التربيه والتعليم وكذلك اولياء امور الطلبه واساتذه الجامعه , ولازالت الهم الاكبر , وذلك لاختلاف سياسه اعداد المعلم من دولة واخرى وحسب الفلسفه التربويه والمتغيرات والتطورات السريعه التي يشهدها العالم
وفي ضوء ماتقدم , ان المعلم هو احد عناصر العمليه التربويه في اي بلد . بعد الطالب والمنه
... Show MoreThe aim of this research is to make a new investigation of a scientific thesis in Arabic Morphology in which an allusion occurred in relation to its real author and its title, there is alot of dropping and flaw when it was first applied due to depending on one written transcript
Parmi les oeuvres d'Albert Camus, qui s'éloignent un peu de sa
tendance générale qui traite les thèmes de l'absurde ,du néant et de la
question de la mort , on trouve son recueil "l'Exil et le Royaume" 1957
qui contient six nouvelles qui sont d'une invention moins épouvantable
(le Renégat , la Femme adultère , les Muets , le Pierre qui pousse , l'Hôte
et Jonas). Ces nouvelles , à l'exception du "Renégat" , ne provoquent pas
les questions philosophiques et dialectiques qui dominent la plupart des
oeuvres d'Albert Camus , Mais ces nouvelles traitent tout simplement la
question d'homme exilé dans son existence et sa recherche perpétuelle
de son royaume.
Background: DVT is a very common problem with a very serious complications like pulmonary embolism (PE) which carries a high mortality,and many other chronic and annoying complications ( like chronic DVT, post-phlebitic syndrome, and chronic venous insufficiency) ,and it has many risk factors that affect its course, severity ,and response to treatment. Objectives: Most of those risk factors are modifiable, and a better understanding of the relationships between them can be beneficial for better assessment for liable pfatients , prevention of disease, and the effectiveness of our treatment modalities. Male to female ratio was nearly equal , so we didn’t discuss the gender among other risk factors. Type of the study:A cross- secti
Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show MoreIn this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.
This book includes four main chapters: 1. Indefinite Integral. 2. Methods of Integration. 3. Definite Integral. 4. Multiple Integral. In addition to many examples and exercises for the purpose of acquiring the student's ability to think correctly in solving mathematical questions.