Ahmed ibn Imad ibn Yusuf al-Aqfhasi (808 AH / 1405 AD) is a small message that speaks about the Nile River in all its sides, despite its limited papers, but it is one of the manuscripts of the important geographical literature for its geographical, historical, religious and grammatical information. it was not limited to the information of the author alore, but taken from many sources below, which added to the importance of the fact that it has saved us the names of the sources that preceded him in mentioning this river with the names of its authors.The method of the Aqfhasi was characterized by scientific methodology in writing and clarity, with reference to some of the myths that people carried in their minds about the Nile River at that time.
International trade in services is becoming increasingly important as it is an economic activity that deals with invisible trade, which has become increasingly important in the balance of international trade. The establishment of the WTO is a starting point in international trade relations. It is responsible for all aspects of international trade, , And in view of the continued increase in international trade in services, the need for more internationally recognized rules has become more urgent, especially as it has been increasingly proven that the traditional framework of public services is inadequate to operate some of the most dynamic and innovative sectors of the economy. (GATS) to be the regulatory framework for this sector
... Show MoreThe Estimation Of The Reliability Function Depends On The Accuracy Of The Data Used To Estimate The Parameters Of The Probability distribution, and Because Some Data Suffer from a Skew in their Data to Estimate the Parameters and Calculate the Reliability Function in light of the Presence of Some Skew in the Data, there must be a Distribution that has flexibility in dealing with that Data. As in the data of Diyala Company for Electrical Industries, as it was observed that there was a positive twisting in the data collected from the Power and Machinery Department, which required distribution that deals with those data and searches for methods that accommodate this problem and lead to accurate estimates of the reliability function,
... Show Moreعُني العرب منذ القدم بإستعمال الجواهروالأحجار الكريمة ، وإزدادت هذه العناية على مر العصور ، فقد إستعملوا الحلي المتنوعة ، والملابس المطعمة بالجواهر والأحجار الكريمة .
Five sites were chosen to the north of Babil Governorate in order to identify the limnological features and the impact of the Hindiya Dam during 2019. Site2 was located near the dam to reflect the ecological features of this site, whereas other sites, S1 was located at the upstream of the dam as a control site. Moreover, the two other sites S3 and S4 were located down the dam. The results of the study showed a close correlation between air and water temperature at all sites. Also there were significant differences in average of thirteen out of eighteen water parameters.Water temperature, total alkalinity, bicarbonate, DO, POS, TH and Mg+2 ions decreased from 22.76˚C, 203.33 mg/L,
... Show Moreالجمود المؤسسي واثره في فشل التنمية السياسية : محاولة من اجل بناء مفهوم
من اهداف بعض التجارب هي معرفة تاثير التسلسلات المختلفة لبعض الادوية او التغذية او تجارب التعلم. وفي بعض الاحيان قد تكون الوحدات التجريبية نادرة لهذا نقوم باستخدام الوحدات التجريبية على نحو متكرر. او بسبب الميزانية المحدودة فان صاحب التجربة يخضع كل وحدة تجريبية لاختبارات عديدة ويطلق على هذا النوع من التجارب التي يتم فيها استخدام الوحدات التجريبية (الاشخاص) Subject على نحو متكرر
... Show MoreBackground: preparation of root canals is an important step in root canal treatment. Mechanical instrumentation of root canals cause an irregular layer of debris, known as the smear layer. As a result, several studies reported that preferring the removal of the smear layer. Objective: To study the influence of the energy (100 mJ) of Erbium, Chromium: Yttrium Scandium Gallium Garnet (Er,Cr:YSGG) laser at short pulse duration (60 μs) on smear layer removal of apical third after using Photon induced photoacoustic streaming technique. Materials and methods: Eighteen straight single-rooted mandibular premolars were used. The roots length were uniform to 14mm from the anatomic apex and
... Show MoreThe reasons for the totality are varied and multiple, some of which are attributed to the methods of the Arabic language as the participant
Verbal and omnipotent differences in the oud of conscience, which are comprehensive reasons for language in all
And some of these reasons are due to the sciences of the Qur'an, such as cessation and initiation
The explanation of the explanation for the multiplicity of words and differences in them, which necessarily led to a dispute jurisprudence
Linked to the origin of disagreement in the interpretation of the totality and its orientation and understanding and to summarize this subject and diverge
Parts and vocabulary did not receive the necessary care and did not absorb the lesson an
The research aims to demonstrate the impact of governance mechanisms on the quality of financial reports in the light of the accounting disclosure for sustainable development represented in (accounting disclosure for economic development, accounting disclosure for environmental development, and accounting disclosure for social development) in a sample of banks listed in the Iraq Stock Exchange.
Governance mechanisms were measured by evaluating and analyzing the mechanisms in banks for the research sample consisting of (15) banks, based on the governance guide issued by the Central Bank, as well as the banks’ financial reports for the years 2016 -2018, and the dimensions of accounting disclosure for sust
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show More