أن الوعي الذاتي والمعرفة قد برزت أهميتها في الفكر السياسي الليبرالي الحديث وجاءت من أجل المناداة بأهمية الوعي في جوهر الفرد فقد بين أغلب المفرين وأبرزهم جون لوك وايمانويل كانط، أكد لوك بأن حالة الوعي الذاتي تكتسب بالتجربة من خلال الإحساس والتأمل او التفكير، فالعقل صفحة بيضاء خاوية ولا توجد فيها أفكار فطرية ولكن في نفس الوقت يؤكد على وجود قوة فطرية في العقل وليست أفكار يمكن ان تحول الأفكار البسيطة الى مركبة منتجه أفكار ومعرفة ووعي، اما عملية اكتساب الوعي الذاتي عند كانط تكونت من خلال محاولته للجمع بين العقلانيين والتجريبيين ، اذ عمل على ربط التجربة بالعقل من خلال وجود مقولات وتصورات وشروط ذاتية قبلية سابقة على التجربة موجودة في العقل يمكن تسميتها بالأفكار الفطرية موجوده في العقل الخالص وأخرى متأتية من الحواس باصطدامها بالأشياء الخارجية، ،فالوعي الذاتي عند كانط عملية تحدث بأكملها داخل الذات على مادة تأتي من الخارج هي المعطيات الحسية للظواهر، التي تشكل المادة الخارجية للأشياء في ذاتها، مكونة الوعي الذاتي للأفراد
The current research included (the evaluation of Information Security Management System on according to international standard (ISO / IEC 27001: 2013) in Iraqi Commission for Computers and Informatics), for the development of an administrative system for information security is considered a priority in the present day, and in the light of the organizations dependence on computers and information technology in work and communication with others. The international legitimacy (represented by the International Organization for standardization (ISO)) remains the basis for matching and commitment and the importance of the application of information Security Management System accordi
... Show MoreThis research includes the application of non-parametric methods in estimating the conditional survival function represented in a method (Turnbull) and (Generalization Turnbull's) using data for Interval censored of breast cancer and two types of treatment, Chemotherapy and radiation therapy and age is continuous variable, The algorithm of estimators was applied through using (MATLAB) and then the use average Mean Square Error (MSE) as amusement to the estimates and the results showed (generalization of Turnbull's) In estimating the conditional survival function and for both treatments ,The estimated survival of the patients does not show very large differences
... Show Moreيهدف البحث الى التعرف على اثر استراتيجية نجمتين وامنية في تحصيل مادة الكيمياء عند طلاب الصف الثاني المتوسطولتحقيق هدف البحث تم اتباع المنهج التجريبي ذو الضبط الجزئي وتم تحديد مجتمع البحث بطلاب الصف الثاني المتوسط لجميع المدارس الثانموية والمتوسط التابعة لمديرية تربية الكرخ الثانية وتم اخنيار احد هذه المداس بصورة قصدية لتطبيق تجربة ابلبحث الحالي
The aim of this research is to make a new investigation of a scientific thesis in Arabic Morphology in which an allusion occurred in relation to its real author and its title, there is alot of dropping and flaw when it was first applied due to depending on one written transcript
Material Requirements Planning System (MRP) is considered as one of the planning and controlling of production and inventory systems which is used to prepare plan of the final production requirements and its parts of subcomponents raw materials and the time at which it was needed for the purpose of preparing orders of production and purchase.
The problem of the present work is represented in the general company of electrical industrialization adoption of traditional methods and personal experience of the process of the products and\or purchase quantity and inventory quantities and limiting the required time for acquiring the required quantities of the materials and parts used in the finish product of the
... Show MoreAbstract:
Purpose\The researcher paper aims to determine the impact of information technology on the job performance, for Iraq private ban as through the use of technology dimensions of job performance.
The aim of this research: this study aims to discuss the importance of information technology and its role in achieving job performance and its impact on the Iraq banking sector design/ methodology/ approach used entrance design/methodology/approach- pilot, the questionnaire was used to collect data in order to develop a model to measure reliably and correctly to the variables of information technology and job performance, and hypotheses were tested through the use of some statisti
... Show Moreهدف ال الأسلوب المعرفيّ م الإد ا ركيّ اضة للبنات، والتعرّف على علاقة التنظ ة وعلوم الر ة البدنّ ة التر لّ ة في ات المرحلة الثانّ طال إنّه احثتان اضة للبنات، وأفترضت ال ة وعلوم الر ة البدنّ ة التر ل ة في ات المرحلة الثان عض طال التأمّليّ الاندفاعيّ لدى اس الأسلوب المعرفيّ التأمّليّ الاندفاعيّ لدى عیّنة م الإد ا ركيّ ونتائج مق اس التنظ ة بین نتائج مق
... Show MoreSince the advent of the sunrise of the immortal message, Islamic legislation has always established justice and the right guidance, and has prevented any perversion, injustice or corruption, with a divine system that called in its course the characteristics of the legislation on its general basis and its ability to develop, progressivity, and paving the way with a collective approach, accompanied by the worldly and moral punishment. When the corrupters went too far, reformers were delayed and values were missed; Mankind has been afflicted with the scourge of injustice and loss, and has lost sight of the approach that the Creator of the world has given to the people of the world, for what would guide them in their affairs sooner and later
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show More