Social Aspects in the Kingdom of Mali Through Ibn Battuta's book Tuhfat Alnuddar in Garaeb Al Amsar Wa Ajaeb Al Asfar
The aim of this research is to find a relation between self-protection and the social - ignorance of the univresity students. In applying the aims of the reaearch, the ressearcher has constructed two scales to measure
self - protection and the social - ignorance. After finding their validity and stability and their discriminative power, the researcher has applied them on a sample of (200) male and female. University students, who were selected randomly. The results of the research has arrived at finding a positive relation between self-protection and social - ignorance.
The researcher has recommended a concentration on the role of parents in raising their childern depending on themselves and making f
... Show MoreThe aim of the research is to identify the educational and psychological effects of the positive and negative aspects of using social networking websites. The researcher administered a number of questions to (250) users of different types of social networking websites. He analyzed his research results and obtained a number of results. The research has reached a number of recommendations and suggestion: Regulating the use of social media. Monitoring the parents of the sites used by children in a way that they do not feel they are observers. It is necessary to devote an hour daily to show the importance of real social life for children other than using social media. It is necessary to show the importance of choosing friends who hav
... Show MoreThe research aims to shed light on the financing structure, which is one of the important pillars of financial management in the commercial banking sector, which enhances its financial position through financing its various investments, which is one of the pillars of the successful economy of the commercial banking sector. in which country. The contents of the research variables, which were represented by the independent variable, financing structure, the dependent variable, and investment decisions in commercial banks, which the researcher tried to address, as the research began with a basic variable that depends on diagnosing the impact of the financin
... Show MoreThe concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show MoreThis study aims to identify the role of forensic accounting in resolving banking disputes in the Iraqi environment, and to achieve this goal, the fiel
d survey method was used, as it is the most appropriate for studying the phenomenon in question and achieving its objectives. A sample of (50) male and female employees was selected, distributed among five banks listed on the Iraq Stock Exchange in the Baghdad governorate. The questionnaire tool prepared for this purpose was applied to them, which consisted of two main axes. The first axis included paragraphs of questions related to the importance of forensic accounting. The second axis relates to disputes At the end of the research, we reached a set of conclusions, the most import
... Show MoreThis present work is concerned with one of the syntactic issues that has been researched by many linguists, grammarians, and specialists in Islamic studies, the estimated answer to a condition. However, this topic is researched this time by examining Imam Al-Qurtbi’s opinions in interpreting related ayas from the holly Quraan in his book (Collector of Quranic Rules) or its transliteration (Al-Jami’ Li Ahkam Al-Quran). Such a step involves commenting on, tracking what Al-Qurtbi said in this regard, discussing it from the points of view of other grammarians, and judging it accordingly, taking into account the apparent surface structures of the examples collected. To achieve this objective, the inductive analytical approach has be
... Show MorePraise be to God, Lord of the Worlds, and prayers and peace be upon the most honorable of creation, Muhammad, whom God sent as a mercy to the worlds, and his pure God and his faithful companions. The Islamic heritage was replete with texts issued from among the pure infallibility, which constituted a prominent teacher that takes the student to stop there in search of its goals, purposes and beauty. The choice was made from those texts that were issued by the imams of Muslims in the Abbasid era, namely Imam Muhammad al-Jawad, his son Imam Ali al-Hadi and his grandson Imam Hassan Zaki al-Askari. (Peace be upon them), and scholars have called them (sons of satisfaction), and researchers have shed light on these texts from rhetorical, artistic
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show More
