The main purpose of the research is to study the significance of the event in the explicit source and its significance in the Mimi source and to explain the difference between them in the Holy Quran, especially since most linguists were not interested in what the Mime source indicates in the text, but focused on its form and form, as they defined it as the name Linguists and grammarians did not mention a difference in meaning between the explicit source and the Mimi source, and they interpret the second in the first sense, which led me to choose this topic, to know the significance of each source through Appeal to the maqam and occasion in a challenge D The exact meaning.
Due to a party's violation of his obligations or responsibilities indicated in the contract, many engineering projects confront extensive contractual disputes, which in turn need arbitration or other forms of dispute resolution, which negatively impact the project's outcome. Each contract has its terms for dispute resolution. Therefore, this paper aims to study the provisions for dispute resolution according to Iraqi (SBDW) and the JCT (SBC/Q2016) and also to show the extent of the difference between the two contracts in the application of these provisions. The methodology includes a detailed study of the dispute settlement provisions for both contracts with a comparative analysis to identify the differences in the appli
... Show MoreThe Character is one of the elements of Storytelling, as it is the center of the plot, making it the basis on which the talk is about. The talk is the portrayal of the character while they’re acting; the novelist presents the character by interacting with the events, and the extent of the negative and positive appearing impact on the character. It should be noted that everyone has two personalities or more, each one appearing in a different position or situation. For instance, a man can be a father, a lover, an employee, a son or anyone else .. in another position, he might be a master, and in another a looser begging for the mercy of his humiliator, and sometimes he can show weakness to the one he loves, or show strength to his enemie
... Show MoreThis study focused on two areas in AL-Najaf city, AL-Ruhbah and Al-Haydariyah regions because of the importance and widespread use of groundwater in these areas. The two areas were compared quantitatively and qualitatively. For the quantitative approach, the GMS software was used in conjunction with the GIS software to simulate the groundwater flow behavior. The solid model for both areas was created, the geological formation was determined, and the hydraulic properties were identified using GMS software. To test the quantity of groundwater in both areas, the wells have been redistributed to a distance of 2000 m between them, and a period of 1000 days was chosen. When a discharge of 10 l/s and operation times of 4, 8, an
... Show MoreAbstract
The current research aims to identify the level of partnership between school and community agencies to improve secondary school outcomes for students with intellectual disabilities and develop strategies that help enhance community partnerships between schools and agencies. The researcher used the qualitative research approach; he utilized the interviews as a tool for data collection. The sample of research included (12) participants: three female school leaders, three male-school leaders, three female-school supervisors, and three male-school supervisors in schools that have programs for students with intellectual disabilities in Riyadh. The results of the study showed that the level of partnership bet
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreOrganizations nowadays, whether public or private organizations, productive or service (such as banks), face major challenges as a result of rapid and continuous changes, and in front of these challenges traditional management operations and tools become unable to make the organization able to work, which makes it imperative for these organizations to follow the methods and management practices, including the proposed knowledge risk management and strategic direction so that it can elevate its actions at the level of developments in reality, in the sense that these organizations and in the light of environmental developments to characterize their strategic direction as an intellectual approach characterized by mo
... Show MoreBackground. The presence of black triangles around the dental implant-supported prosthesis and the failure to construct adequate papillae around them bothers dental implantologists. Peri-implant surgical soft tissue management will improve esthetics, function, and implant survival. Aim. To compare the effects of rolled and nonrolled U-shaped flaps combined with a temporary crown in enhancing the soft tissue around dental implants. Materials and Methods. Forty patients were included in this study; all patients were operated on by the same maxillofacial surgeon at Al-Iraq specialized dental clinics from January 2019 to January 2020. Patients were divided randomly into two groups: group A: at the second stage of implant surgery, a U-sh
... Show More