اعتمدت الدراسة على (65) نصاً ذات مضامين اقتصادية، تم اختيارها من المتحف العراقي من المجموعة ماتعرف بالمصادرة، ومن خلال دراسة النصوص ومقارنتها مع نصوص منشورة من سلالة أور الثالثة تبين أنها تعود الى العصر نفسه استناداً الى الصيغ التاريخية الواردة فيها، اذ ذكرت سنوات حكم اَخر ثلاثة ملوك هم أمارسين وشوسين وأبي سين، كما أمكن من خلال الدراسة أيضاً وأستناداً الى أسماء الاشهر وأسماء الاشخاص الواردة فيها تحديد عائديتها الى موقعي أوما (جوخة) و بوزرش- داكان (دريهم). تألفت هذه الدراسة من تمهيد وأربعة فصول: تضمن التمهيد موجز عن تاريخ سلالة أور الثالثة، وتضمن الفصل الاول من هذه الدراسة مبحثين، تناول المبحث الاول المضامين العامة للنصوص المسمارية، أما المبحث الثاني فقد تناول دراسة النصوص المسمارية غير المنشورة وترجمتها وتحليلها. خُصّص الفصل الثاني لدراسة عائدية النصوص، ويتألف من ثلاثة مباحث، تناول المبحث الاول موقع أوما والمبحث الثاني موقع دريهم، أما المبحث الثالث فقد تناول التقاويم الواردة في نصوص الدراسة. اما الفصل الثالث فقد خصص لدراسة أسماء الأشخاص الواردة في النصوص ودورهم في أعمال التسلم والتسليم والوساطة. وتضمن الفصل الرابع مبحثين، تناول المبحث الاول منها وصولات التسلم (Bullae) تاريخها وأصولها، وضم المبحث الثاني دراسة طبعات الاختام الواردة في النصوص. ثم الاستنتاجات التي توصلت اليها الدراسة.
Faintly continuous (FC) functions, entitled faintly S-continuous and faintly δS-continuous functions have been introduced and investigated via a -open and -open sets. Several characterizations and properties of faintly S-continuous and faintly -Continuous functions were obtained. In addition, relationships between faintly s- Continuous and faintly S-continuous function and other forms of FC function were investigated. Also, it is shown that every faintly S-continuous is weakly S-continuous. The Convers is shown to be satisfied only if the co-domain of the function is almost regular.
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreIn this paper, the Azzallini’s method used to find a weighted distribution derived from the standard Pareto distribution of type I (SPDTI) by inserting the shape parameter (θ) resulting from the above method to cover the period (0, 1] which was neglected by the standard distribution. Thus, the proposed distribution is a modification to the Pareto distribution of the first type, where the probability of the random variable lies within the period The properties of the modified weighted Pareto distribution of the type I (MWPDTI) as the probability density function ,cumulative distribution function, Reliability function , Moment and the hazard function are found. The behaviour of probability density function for MWPDTI distrib
... Show Moreلمقدمة
الحمد لله رب العالمين والصلاة والسلام على سيد الأنبياء والمرسلين نبينا محمد صلى الله عليه وسلم وعلى واصحابه أجمعين ومن تبعهم وأهتدى بهداهم الى يوم الدين اما بعد :
فوظيفة القضاء وظيفة سامية يراد منها اقامة العدل ولا يستقيم حالهم الا به دفعاّ للظلم ، ولقد اولى النبي صلى الله عليه وآله وسلم ومن بعده الخلفاء الراشدون
... Show MoreA new generalizations of coretractable modules are introduced where a module is called t-essentially (weakly t-essentially) coretractable if for all proper submodule of , there exists f End( ), f( )=0 and Imf tes (Im f + tes ). Some basic properties are studied and many relationships between these classes and other related one are presented.
على الرغم من تحقق ثورة هائلة وطفرة نوعية في مجال تكنلوجيا الاتصالات في دول العالم الا ان بلدنا كان محروما من التمتع بهذه التقنيات الحديثة في ظل النظام السابق, وبعد سقوط النظام ووجود بحبوحة من الحرية، دخلت الكثير من هذه التقنيات الى العراق ومنها الموبايل والانترنيت وغيرها من وسائل الاتصال المتطورة.
ويقول (Smith & Fletcher, 2001) في كتابهما Inside Information
... Show MoreMany reasons combined behind the Standing of U.S. against Britain in its aggression against Egypt in 1956; the consensus of world opinion on the need to stop the aggression and the fear of the Soviet military intervention which mean a new world war.
United States desired to weaken British influences in the region in general to get new oil gains in the Arabian Gulf and Egypt at the expense of Britain. The exiting of Britain from the area served U.S. strategic interests in the Middle East in general and Egypt in particular to keep the flow of oil for U.S advantage.
The United States wanted to keep its image in the region to apply its future political projects including Eisenhower Project, which intended to take the position of Britis
Care and attention to the structure in the sixties of the last century replaced the mark, and if the structure of Ms. pampered in research and studies, it has become the mark is also a spoiled lady .. But the relationship between the structure and the mark was not a break and break, but the relationship of integration, His themes are structural analysis, and these are intellectual themes that can not be surpassed in contemporary research, especially since semiotics have emerged from the linguistic inflection.
We have tried to distinguish between text and speech, which is a daunting task, as it seems that whenever the difference between them is clear and clear, we come back to wonder whether the text is the same discourse, and is
... Show MoreThis paper deals with defining Burr-XII, and how to obtain its p.d.f., and CDF, since this distribution is one of failure distribution which is compound distribution from two failure models which are Gamma model and weibull model. Some equipment may have many important parts and the probability distributions representing which may be of different types, so found that Burr by its different compound formulas is the best model to be studied, and estimated its parameter to compute the mean time to failure rate. Here Burr-XII rather than other models is consider because it is used to model a wide variety of phenomena including crop prices, household income, option market price distributions, risk and travel time. It has two shape-parame
... Show More The university professor is the main theme in the educational process, then we must have prepared attention and study, it is the upper hand in achieving the objectives of education and a factor of development of society and its development factors that set it up and increase the efficiency of the duties of universities and development centers and through that evaluation is essential process and Zerorah to improve his performance, especially if they're the evaluation process from the standpoint of their students
research goals
The current research aims to identify:
1. identify the effectiveness of teaching the University of Tikrit from the standpoint of their students
2. to identify the differences in