Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations, after the terrorist was part of the weapon. Used in the terrorist operation, other types of weapons, tools and means have entered the terrorist scene. The weapons used have allowed the implementation of operations across distances, through remote control devices, drones and other technologies that enable terrorist elements to amplify the effect of operations according to In order to reduce costs, including the costs of terrorist elements carrying out operations, and causing the greatest amount of losses and terror in the targeted community or the country.
Because of the fierce competition between service organizations on the one hand and the increasing demands of customers on the other. Therefore, these organizations sought to distinguish their service by taking care of all aspects. One of these important aspects is the service encounter environment and its reflection on customer emotions, so we choose the current research to clarify the importance and impact on customer satisfaction, the problem of research is how the interest of Iraqi restaurants in the service encounter environment and how to care about its elements and whether this interest is sufficient to reflect the satisfaction of the customer. the goal of the current research was to clarify how much the application of the
... Show MoreThe mix promotion important to any organization in general, has been selected promotional mix tools in this research to identify the role in maximizing the Organization of sales growth business, which included the research problem several fundamental questions about the role of each promotional tool of advertising, public relations and personal selling and sales promotion direct marketing within the promotional mix in the promotion of business sales organization. The research aims to provide theoretical and field organizations surveyed about the role played by the mix promo in sales growth, and importance of research on the identification of more than promotional tools impact on sales gr
... Show MoreIt is known that the distinguished scholar and writers in any kind of science leave an important impact on those who come after them, so they are an indispensable source in that science that draws from them who is later in time than them, and this is what we have seen in this research; The scholar Muhammad bin Shuraih al-Ra’ini (d.476 AH) and his book (Al-Kafi in the Seven Readings) were admired by everyone who wrote about the readings after him. The great scholars of the readings, such as Ibn al-Bathish (d. 540 AH), Ibn al-Jazari (d. 833 AH), and Ibn al-Banna’ did not dispense with him. (d.1117 AH) in terms of reading, isnad, and the way of narration, their books were full of men
... Show MoreThe study aims at elicitation the morals strategies from sunnah depending on the analytic-qualitative method. It revealed a comprehensive integrated system of creative strategies to improve morals. It was categorized into three areas: cognitive strategies, affective strategies, and some strategies based on self-initiative and practice. The researcher recommended that teachers and educators should employ these effective strategies in the process of moral guidance for the Muslim generation. He also recommended that researchers should put more effort to do more In-depth qualitative studies, which must be directed to establish the origin of different education strategies from the Holy Qur’an, the Sunnah, and Muslim scholars’ legacy.
Women are a social entity and can not be ignored starting from the process of creation Almighty and through the fact that it represents half of society and a fundamental factor and the corner can not be dispensed with in the composition of the family it is no longer acceptable to leave women to perform their role social and cultural or competitive and political role and in all aspects of political activity, It was not only women but the entire society lived loss, anxiety and oppression, a natural state created by deviation from the teachings and values of civil and followers of the corrupt positions in perception and conscience and behavior and links and relations and transactions until corruption became prevalent in all Social, economic
... Show Moreيستهدف البحث التعرف على اهمية التعلم باللعب لاطفال رياض الاطفال وانعكاساتها على تعديل سلوكهم، حيث ان اللعب هو دنيا الطفل المليئة بالمتعة والاستطلاع والاستكشاف، كما ان اللعب بالنسبة للاطفال يمثل لهم الحياة بكل ما فيها من معنى.
وفي الوقت نفسه اللعب هو وسيلة من وسائل الضبط والتوجيه للتعامل مع سلوك الاطفال، فمن خلال اللعب نستكشف النبوغ والتفوق منذ وقت مبكر، حيث ان التعلم باللعب يمثل حاجة حيو
... Show MoreAbstract:
Inclusive education has experienced a number of positive educational trends and developments in many different countries, typically by recognising that all students, including those who have special educational needs (SEN), have a right to education. Inclusion of children with SEN in mainstream schools, alongside their peers, has become a major concern for interested educators, professionals and parents in many countries around the world. The reasons for this trend are due to a number of factors such as the increasing attention to the role of education in achieving social justice for pupils with SEN; the right of individuals with SEN to be educated along with their typically developing peers in mainstr
... Show MorePraise be to God, prayer and peace upon our master Muhammad the Messenger of Allah peace be upon him mercy, gift, and grace, and rendered his family and the good righteous is followed until the Day of Judgment. After: The Koran
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show MoreA security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear
... Show More