اعتمدت الدراسة على (65) نصاً ذات مضامين اقتصادية، تم اختيارها من المتحف العراقي من المجموعة ماتعرف بالمصادرة، ومن خلال دراسة النصوص ومقارنتها مع نصوص منشورة من سلالة أور الثالثة تبين أنها تعود الى العصر نفسه استناداً الى الصيغ التاريخية الواردة فيها، اذ ذكرت سنوات حكم اَخر ثلاثة ملوك هم أمارسين وشوسين وأبي سين، كما أمكن من خلال الدراسة أيضاً وأستناداً الى أسماء الاشهر وأسماء الاشخاص الواردة فيها تحديد عائديتها الى موقعي أوما (جوخة) و بوزرش- داكان (دريهم). تألفت هذه الدراسة من تمهيد وأربعة فصول: تضمن التمهيد موجز عن تاريخ سلالة أور الثالثة، وتضمن الفصل الاول من هذه الدراسة مبحثين، تناول المبحث الاول المضامين العامة للنصوص المسمارية، أما المبحث الثاني فقد تناول دراسة النصوص المسمارية غير المنشورة وترجمتها وتحليلها. خُصّص الفصل الثاني لدراسة عائدية النصوص، ويتألف من ثلاثة مباحث، تناول المبحث الاول موقع أوما والمبحث الثاني موقع دريهم، أما المبحث الثالث فقد تناول التقاويم الواردة في نصوص الدراسة. اما الفصل الثالث فقد خصص لدراسة أسماء الأشخاص الواردة في النصوص ودورهم في أعمال التسلم والتسليم والوساطة. وتضمن الفصل الرابع مبحثين، تناول المبحث الاول منها وصولات التسلم (Bullae) تاريخها وأصولها، وضم المبحث الثاني دراسة طبعات الاختام الواردة في النصوص. ثم الاستنتاجات التي توصلت اليها الدراسة.
The university professor is the main theme in the educational process, then we must have prepared attention and study, it is the upper hand in achieving the objectives of education and a factor of development of society and its development factors that set it up and increase the efficiency of the duties of universities and development centers and through that evaluation is essential process and Zerorah to improve his performance, especially if they're the evaluation process from the standpoint of their students
research goals
The current research aims to identify:
1. identify the effectiveness of teaching the University of Tikrit from the standpoint of their students
2. to identify the differences in
The present paper studies the generalized Φ- recurrent of Kenmotsu type manifolds. This is done to determine the components of the covariant derivative of the Riemannian curvature tensor. Moreover, the conditions which make Kenmotsu type manifolds to be locally symmetric or generalized Φ- recurrent have been established. It is also concluded that the locally symmetric of Kenmotsu type manifolds are generalized recurrent under suitable condition and vice versa. Furthermore, the study establishes the relationship between the Einstein manifolds and locally symmetric of Kenmotsu type manifolds.
على الرغم من تحقق ثورة هائلة وطفرة نوعية في مجال تكنلوجيا الاتصالات في دول العالم الا ان بلدنا كان محروما من التمتع بهذه التقنيات الحديثة في ظل النظام السابق, وبعد سقوط النظام ووجود بحبوحة من الحرية، دخلت الكثير من هذه التقنيات الى العراق ومنها الموبايل والانترنيت وغيرها من وسائل الاتصال المتطورة.
ويقول (Smith & Fletcher, 2001) في كتابهما Inside Information
... Show Moreהריאליזם הספרותי במשמעו הכללי מצייג אשר כל מה מציינת בה הספרות מציורים מדוייקים לסביבה ולכן
אדם. ויש להתחשב בפרטים המשותפים לחיים היומיומית.
האסכולה הריאליזטית מצטיינת בזיאנרים אין זוכים בם איזו אסכולה ספרותית אחרת . האסכולה הזאת
הופיעה בספרות העברית החדשה כתוצאה להשפעתה של הספרות העברית בספרות העולמית האחרת ,
והמספרים העבריים בתנוטה הספרותית החדשה השתדלו במאמצים גדולים למען להתפתח את התנועה הזאת
The using of the parametric models and the subsequent estimation methods require the presence of many of the primary conditions to be met by those models to represent the population under study adequately, these prompting researchers to search for more flexible parametric models and these models were nonparametric, many researchers, are interested in the study of the function of permanence and its estimation methods, one of these non-parametric methods.
For work of purpose statistical inference parameters around the statistical distribution for life times which censored data , on the experimental section of this thesis has been the comparison of non-parametric methods of permanence function, the existence
... Show MoreThe objective of the study is developing a procedure for production and characterization of rice husk ash (RHA). The effects of rice husk (RH) amount, burning/cooling conditions combined with stirring on producing of RHA with amorphous silica, highest SiO2, lowest loss on ignition (LOI), uniform particle shape distribution and nano structured size have been studied. It is concluded that the best amount is 20 g RH in 125 ml evaporating dish Porcelain with burning for 2 h at temperature 700 °C combined with cooling three times during burning to produce RHA with amorphous silica, SiO2 90.78% and LOI 1.73%. On the other hand, cooling and stirring times affect the variation of nano structured size and particle shape dis
... Show MoreCare and attention to the structure in the sixties of the last century replaced the mark, and if the structure of Ms. pampered in research and studies, it has become the mark is also a spoiled lady .. But the relationship between the structure and the mark was not a break and break, but the relationship of integration, His themes are structural analysis, and these are intellectual themes that can not be surpassed in contemporary research, especially since semiotics have emerged from the linguistic inflection.
We have tried to distinguish between text and speech, which is a daunting task, as it seems that whenever the difference between them is clear and clear, we come back to wonder whether the text is the same discourse, and is
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreFaintly continuous (FC) functions, entitled faintly S-continuous and faintly δS-continuous functions have been introduced and investigated via a -open and -open sets. Several characterizations and properties of faintly S-continuous and faintly -Continuous functions were obtained. In addition, relationships between faintly s- Continuous and faintly S-continuous function and other forms of FC function were investigated. Also, it is shown that every faintly S-continuous is weakly S-continuous. The Convers is shown to be satisfied only if the co-domain of the function is almost regular.