The study of the language through the prophetic curriculum in general and the semantics in particular through the books of Professor Abdul Salam Yassin, may God have mercy on him and the most distinctive linguistic phenomena, and then study semantics and the most prominent methods that reveal the emotions dominated by this study to indicate the semantics of religious terms In this research we try to dive into the sea of significance to know the relationship between the words and their connotations, and to monitor aspects of semantic development, although we have left non-essential words in order to avoid lengthening. N or three and sometimes Aguetsarna on one example we thought it was enough to clarify the meaning.
The research aims to verify the Role of Internal Auditing in Assessing the Risks of Strategic Operations (Acquisition) and then reflect on management decisions. Since all corporations wish to expand, growth and domination of the market may expose them to multiple risks that lead to failure. The research assumes two main hypotheses. First, there is no role for internal audit in evaluating the strategic operations (acquisition). Second, there is no relationship between internal auditing in assessing the risks of strategic operations (Acquisition) and management decisions. The data was collected by using a questionnaire distributed to a group of private bank employees. The statistical analysis regarding research rejected the two hyp
... Show MoreThe purpose of this study is to assess the level of computer literacy of the students at AlQuds open university in Tulkarm Branch. The study investigates the effects of the variables of gender, specialization, academic level, owning a personal computer, internet communication, and own an email account on the level of computer literacy. A test of computer literacy was constructed by the researchers consisting of (37) multiple choice items with a reliability rate (0.85). The study population consisted of (4100) students, while the sample contained (352) students. The study revealed that the level of computer literacy of the students at AlQuds Open University in Tulkarm Branch was (66.2 %) which is educationally acceptable. It also
... Show MoreThe neutron, proton, and matter densities of the ground state of the proton-rich 23Al and 27P exotic nuclei were analyzed using the binary cluster model (BCM). Two density parameterizations were used in BCM calculations namely; Gaussian (GS) and harmonic oscillator (HO) parameterizations. According to the calculated results, it found that the BCM gives a good description of the nuclear structure for above proton-rich exotic nuclei. The elastic form factors of the unstable 23Al and 27P exotic nuclei and those of their stable isotopes 27Al and 31P are studied by the plane-wave Born approximation. The main difference between the elastic form factors of unstable nuclei and the
... Show MoreAbstract
The aim of the current research is to identify the level of administrative applications of expert systems in educational leadership departments in light of the systems approach. To achieve the objectives of the research, the descriptive-analytical and survey method was adopted. The results showed that the level of availability of the knowledge base for expert systems in educational leadership departments (as inputs) was low. The level of availability of resources and software for expert systems in educational leadership departments (as transformational processes) came to be low, as well as the level of availability of the user interface for expert systems in educational leadership departments (as outputs
... Show MoreThe philosopher and social psychologist Erich Fromm (1900-1980), in his book "Escape from Freedom" highlighted the distinction between the "I" of the authoritarian personality and the "I" of the destructive personality based on their stance towards "the other." The former (the authoritarian self) relies on a submissive, enslaving formula, where the "I" is the master/dominator/controller/strong, while "the other" is the servant/submissive/controlled/weak, essential for perpetuating this formula. In contrast, the latter (the destructive self) relies on an annihilating, negating formula, where the "I" is existence/killer/destroyer/pe
... Show MoreCuO-ZnO-Al2O3 catalyst was prepared in the ratios of 20:30:50 respectively, using the coprecipitation method of Cu, Zn and Al carbonates from their nitrate solutions dissolved in distilled water by adding sodium bicarbonate as precipitant.The catalyst was identified by XRD and quantitatively analysis to determine the percentages of its components using flame atomic absorption technique. Also the surface area was measured by BET method. The activity of this prepared catalyst was examined through the oxidation of ethanol to acetaldehyde which was evaluated by gas chromatography.
RNA Sequencing (RNA-Seq) is the sequencing and analysis of transcriptomes. The main purpose of RNA-Seq analysis is to find out the presence and quantity of RNA in an experimental sample under a specific condition. Essentially, RNA raw sequence data was massive. It can be as big as hundreds of Gigabytes (GB). This massive data always makes the processing time become longer and take several days. A multicore processor can speed up a program by separating the tasks and running the tasks’ errands concurrently. Hence, a multicore processor will be a suitable choice to overcome this problem. Therefore, this study aims to use an Intel multicore processor to improve the RNA-Seq speed and analyze RNA-Seq analysis's performance with a multiproce
... Show MoreCybercrime and risks to children between the problems and solutions( An analytical study in the light of international, Arab and national statistics).
Lies the problem of the study to identify a new type of crime is different from the same traditional character of the crimes or what was customary since human creation up to the information revolution and we enter the era of globalization, which is also called (cyber crime) and their negative impact on all segments of society, especially children, as they the day of the most important social security threats, for all local and international communities alike , and those risks require collective action to various sectors and segments of society ,especially the educated classes in order t