The research talks about the most important challenges facing Muslim youth of their ideological, social and economic types, and the youth is facing several problems, the most important of which are the intellectual and social invasion to which the Islamic nation has been exposed and ways to address them from a Quranic perspective and find solutions to these problems and these challenges in accordance with Islamic Sharia and the texts of the Holy Quran. From three topics and several demands, during which the researcher tried to find solutions to each challenge through the verses of the Noble Qur’an.
The influence of culture on accounting systems and practices, including financial reports and accounting information through the values identified by Gray and derived from social-cultural values, and the four accounting values were derived from generally accepted accounting principles represented by (Conservatism, Uniformity, Secrecy, and Professionalism). Important and significant in maximizing financial performance, and measuring the extent of the role of these values in improving financial performance through attention to the values of accounting culture, this research
... Show MoreThe Mannich base ligand was synthesized in an ethanol medium through a condensation reaction of 2-mercaptobenzimidazole and ciprofloxacin at room temperature. Subsequently, several metal complexes of this ligand were prepared. To characterize both the base ligand and the metal complexes, various techniques were employed, including elemental analysis, FT-IR spectroscopy, UV-Vis spectroscopy, molar conductivity measurements, magnetic moment determination, and melting point analysis. The results were shown that the metal complexes formed have the formula [Cr(L)2Cl2] Cl.H2O and [Rh(L)2(H2O)2] Cl3.H2O, where L= mannich base ligand. Based on spectroscopic analytical, coordination with metal ions involves the 'N' donor atom of mannich base
... Show MoreThe current research aims to investigate the skills of the intended meaning beyond the context when reading poetry among fifth literary students. To achieve the aim of the research, the researcher has followed the descriptive approach and used two tools: an open questionnaire that includes an inquiry about the skills of the intended meaning beyond the poetic context, and a closed questionnaire that were examined by the juries, and modified accordingly. Besides, its validity and stability were examined by applying the study on an exploratory sample of (15) teachers to reach its final version and determine the time required to answer it. Then, the researcher applied it on the research sample of (9
... Show MoreHouse 21 fungal isolates fungus to the analyst Albroca output of manufactured blood clot from the Blama human blood showed positive fungi to test analyzes blood clot variation in times where decomposition recorded fungi
Thirty one samples of gum swabs were collected from patients with tooth caries (5-30 years old) from the College of Science (Biology department )- University of Baghdad- Iraq for the period from October 2018 to December 2018. , The samples were transported, after inoculation in a transport media (nutrient broth), to the laboratory of the College of Science and then cultured on mannitol salt agar and blood agar). The isolates belonging to Staphylococcus spp. were identified by biochemical tests and Vitek 2 compact system, while the more antibiotic resistant isolates were identified by using Polymerase Chain Reaction(ï´¾PCR) and sequencing of 16SrRNA . The results showed sharp UV absorption peaks at 330 - 340nm and AFM at 5
... Show MoreThe performance of job effectively requires narrowing the meaningful routine activities and attempting employing the job procedures in favor of public welfare through adding the green impact as well as removing them from the red tapes which reflect the firmness of procedures, to enable the job parties to make their job independently, and pushing them to gain priority in the competition layer. This is not attaining easily amidst the regulatory problems expressed by the complication of procedures, the thing which make identifying the problem of the study through the following question:
Should we make the complex of procedures and their firmness a way to adopt the idea of the green regulatory tapes supportin
... Show MoreThe study aimed to clarify the meanings learned and inferred from reading books، letters and messages in Surat Al-Qur’an. The inductive method، the analytical method، and the deductive method، One of the most prominent results of the research: that the multiplicity of Qur’anic readings produces a variety and expansion in the meaning that has a clear impact on the interpretation by clarifying the meaning of the verse.
|
Social networking sites have become very popular since the beginning of the current decade and have become linked to our daily life. We follow the news, Analyses and opinions on the one issue in a way that attracts millions of users and the number grows every secon On Twitter, one of the most important social networking sites, all social groups rushed from the president to the last citizen to open accounts when they found themselves forced to do so . During the recent Gulf crisis, Twitter was buzzing with Twitter, which achieved the largest circulation globally. Instead of serving the issue and directing it to serve the Arab interest, most of the publications were on th |
Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show More