Statistical studies are reported in this article for an active galactic nuclei sample of different type of active galaxies Seyferts 1, Seyferts 2, and Quasars. These sources have been selected from a Catalogue for bright X-ray galaxies. The name of this index is ROSAT Bright Source Catalogue (RBSC) and the NRAO VLA Sky Survey (NVSS). In this research, multi-wavelength observational bands Radio at 1.4 GHz, Optical at 4400 A0, and X-ray at energy 0.1-2.4 KeV have been adopted in this study. The behavior of flux density ratios has been studied , with respect to the absolute magnitude . Furthermore, the Seyfert1 and Seyfert 2 objects are combined in one group and the QSOs are collectest in another group. Also, it has been fo
... Show MoreStatistical studies are reported in this article for an active galactic nuclei sample of different type of active galaxies Seyferts 1, Seyferts 2, and Quasars. These sources have been selected from a Catalogue for bright X-ray galaxies. The name of this index is ROSAT Bright Source Catalogue (RBSC) and the NRAO VLA Sky Survey (NVSS). In this research, multi-wavelength observational bands Radio at 1.4 GHz, Optical at 4400 A0, and X-ray at energy 0.1-2.4 KeV have been adopted in this study. The behavior of flux density ratios has been studied , with respect to the absolute magnitude . Furthermore, the Seyfert1 and Seyfert 2 objects are combined in one group and the QSOs are collectest in another group. Also, it has been found that t
... Show MoreThis study aims to reveal the role of one of the artificial intelligence (AI) techniques, “ChatGPT,” in improving the educational process by following it as a teaching method for the subject of automatic analysis for students of the Chemistry Department and the subject of computer security for students of the Computer Science Department, from the fourth stage at the College of Education for Pure Science (Ibn Al-Haitham), and its impact on their computational thinking to have a good educational environment. The experimental approach was used, and the research samples were chosen intentionally by the research community. Research tools were prepared, which included a scale for CT that included 12 items and the achievement test in b
... Show MoreThe current study aims to examine the experience of female students with disabilities who studying in university in kingdom of Saudi Arabia. To this end, the researcher used semi-structured interview as an instrument to collect the study data which regards as one of the descriptive approach tools. The sample comprised (12) disabled-female students from multidiscipline within both college of arts and college of education. To analyze the collected data, the author utilized a thematic analysis method following six steps as stated by (Braun and Clark, 2006). The findings revealed that disabled students have a high self-confidence which push them forward to take part in activities that hold on campus. Besides, significant variation were shown
... Show MoreWisdom is the separation and distinction between aim in the word and work and the lack thereof in accordance with the knowledge surrounding the arts of science, which reached a thorough understanding of things and put them in the quorum. In this research, I have tried to discern the characteristics of the wisdom of Imam Hassan al-Askari (peace be upon him) and to explain his methods and actions which are indicative of the various facets of wisdom required by the nature of the actions and behavior that he has to deal with. Or future mother.
The second topic was devoted to the style of Imam (p) and his wisdom in the situations that necessitated the diversity of methods of dealing such as the method of concealment and the method of refer
Abstract
The purpose of the present paper is to light on the relationship between jobs design, analysis and its reflections on reinforcing workers' vocational adjustment. The present paper aims to accomplish cognitive and applied goals, top of which, test of functional analysis ability to have effect upon workers' vocational adjustment via job design directly and indirectly owning to the virtual factor practiced by these practices on the sought organization. The problem of the present paper comes with many, the most important is the of how to bolster and back up worker's technical adjustment through good and accurate design for the job.
Based on this problem and goals as to expla
... Show Moreكان المؤتمر الآسيوي الأفريقي الأول الذي عُقد في مدينة باندونغ الاندونيسية عام 1955 هو المؤتمر هو الأول الذي اجتمعت فيه الدول الآسيوية والأفريقية بعد الحرب العالمية الثانية. كان مؤتمر باندونغ بمثابة نقطة الانطلاق نحو تأسيس حركة عدم الانحياز، والتي كانت مصر أحد أبرز أقطابها. شهد المؤتمر تقاربا في الآراء ووجهات النظر بين جمهورية مصر العربية وجمهورية الصين الشعبية، لا سيّما وإن الحكومة المصرية كانت قد تبنت س
... Show MoreIslamic banks are a financial institution that is interested in attracting financial savings from financial entities and directing them towards those with financial deficits, both for consumption purposes or for investment purposes. It provides banking services provided by commercial banks and other services But based on the principles and principles of Islamic law, and because of its recent emergence in Iraq, its ability to attract savings is not like non-Islamic commercial banks, which puts them in the option of using their capital to achieve its objective of banking. The research started from the premise that "Islamic banks in Iraq during the period (2008-2012) rely on their capital to perform their activities more than they rely on d
... Show MoreThe present study aims to present a proposed realistic and comprehensive cyber strategy for the Communications Directorate for the next five years (2022-2026) based on the extent of application and documentation of cybersecurity measures in the Directorate and the scientific bases formulating the strategy. The present study is significant in that it provides an accurate diagnosis of the capabilities of the cyber directorate in terms of strengths and weaknesses in its internal environment and the opportunities and threats that surround it in the external environment, based on the results of the assessment of the reality of cybersecurity according to the global Cybersecurity index, which provides a strong basis for building its strategic dire
... Show More