The almighty Al-Bari imposed on Muslims easy and accessible worshipers for every individual who is eligible to commission, so whoever performed it rightfully, God rewarded it with the best reward. From the Muslim, the Almighty made the Almighty to the types of acts of worship and acts of righteousness as a reason for the remission of sins that were advanced and late, so I chose a topic (from the hadiths of righteous deeds mentioned in the atonement of sins) as a research drawn from the master’s thesis called (the hadiths of the atoners of sins that were presented and delayed - An analytical study- ), And collect in this research kinds of acts of righteousness that bring the mercy of God Almighty to His servants and be a reason for the universal forgiveness of all sins committed by a Muslim in his past life to even the next life until he meets his Lord, and that is all in the pure generosity of God Almighty and His kindness to His servants ...
We aimed to obtain magnesium/iron (Mg/Fe)-layered double hydroxides (LDHs) nanoparticles-immobilized on waste foundry sand-a byproduct of the metal casting industry. XRD and FT-IR tests were applied to characterize the prepared sorbent. The results revealed that a new peak reflected LDHs nanoparticles. In addition, SEM-EDS mapping confirmed that the coating process was appropriate. Sorption tests for the interaction of this sorbent with an aqueous solution contaminated with Congo red dye revealed the efficacy of this material where the maximum adsorption capacity reached approximately 9127.08 mg/g. The pseudo-first-order and pseudo-second-order kinetic models helped to describe the sorption measure
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreSeen in Iraq that the volume of insurance activity in the case of a clear deterioration and a sharp decline in demand for life insurance, because of reluctance by senior members of the Iraqi society on the demand for life insurance. The study was descriptive approach in identifying and addressing variables, namely the (perception of risk need of the individual trends in personal income of the individual insurance awareness of the individual customs and traditions of communal religious belief of the individual age and sex of the individual methods promotional company competitive alternatives to the insurance service life inflation rate service life insurance) indepen
... Show Moreيهدف هذا البحث إلى معرفة أثر استخدام دورة التعلم في اكتساب المفاهيم الصرفية واستخلاصها لدى طالبات قسم اللغة العربية بكلية التربية للبنات وقد صيغت فرضيتان مفادهما أن ؛ 1- لا توجد فروق ذات دلالة إحصائية بين متوسط درجات طالبات المجموعة التجريبية اللاتي يدرسن المادة الصرفية في دورة التعلم ومتوسط درجات طالبات المجموعة الضابطة اللاتي يدرسن المادة الصرفية بالطريقة القياسية لاكتساب المفاهيم. 2- لا توجد فروق ذ
... Show Moreيهدف البحث الى قياس مدى التطبيق والتبني للقيادة الملهمة في المنظمات العامة، وقد اشتقت مشكلة البحث النظرية من وجود فجوة معرفية وذلك لقلة الدراسات والبحوث التي تناولت متغير البحث بأبعاده (الرؤية المستقبلية، الثقة بالنفس، تمكين العاملين، ادارة التغيير)، واعتمد البحث المنهج التحليلي عن طريق استعمال الاستبانة في المنظمة التي تم اختيارها وذلك لكونها تعد من المنظمات الاساسية في تقديم الخدمات التعليمية المهمة في
... Show MoreFind extract This research aims to find out (after learning strategy cells in the development of critical thinking and reflective thinking at the fifth-grade students in the geographic literary material). And follow researcher Almhnj demo for the purpose of achieving the goals of current research and design on an experimental group and a control with a test group after me and adopted chose researcher sample Find a way Mqsidih students of junior high Kadhimiya Boys of the breeding Baghdad / Karkh II and to verify the effectiveness of the search coined researcher hypotheses following cases: - 1. No statistically significant between the mean scores of the experimental group and the students taught her students that strategy differences (lea
... Show MoreThe current research aims to study (the effect of strategy of analysis - synthesis duality in the collection of scientific fourth stage students and high-order thinking in Biology material). For evidence the objective of the research, the researcher formulated the following two null hypotheses: 1. There is no significant difference at the statistical level (0.05) between the average of scores of the experimental group students that will study according to the dualism strategy of analysis and structure and the average of scores of the controlled group students that will study according to the normal way in the collection. 2. There is no significant difference at the statistical level (0.05) between the average of scores of the experimenta
... Show Moreوللتحقق من هدف البحث صيغت الفرضية الصفرية الاتية:
- لا توجد فروق ذات دلالة احصائية عند مستوى (0.05 ) بين متوسط درجات طالبات المجموعة التجريبية التي درست وفقا لاستراتيجية (تنال القمر ) ومتوسط درجات طالبات المجموعة الضابطة التي درست على وفق الطريقة الاعتيادية في مقياس مهارات ما وراء المعرفة .
ولأجل التحقق من صحة هذه الفرضية اجرت الباحثة تجربة استغرقت الفصل الدراسي
... Show More