Rasheed Street has had great importance by the nature of what was seen as being of vital events of a key facility in the Iraqi capital Baghdad since ancient times until now .
And such as cultural and historical memory-rich street for Iraq, pulsating nerve since the beginning of the last century thanks to the commercial and intellectual stature, as well as being a tourist landmark frequented alleys most of the tourists coming to Iraq , which counted for them a source of tourist attraction, given the religious diversity of fungal who excelled by the street, as we find in exchange for his Church of the Virgin Mary, the time which was built in the middle of the Caliphs Mosque towering minarets and promised that the oldest and largest of the mosques of the capital Baghdad.
Besides that experienced revolutions and a variety of events it made him the station has attracted attention of every vote being folded sweeter and glory Exploits and Iraqi national.
Street remained of the places where I met tourism, heritage and memories of the old Baghdad in particular fields, bathrooms and markets, and the old-fashioned urban, which reflects the nature of the architecture Baghdadi since its inception and of building as the boulevards as vivid and profound evidence of the effects and properties involving habits and events linked to cause experienced Baghdad more right different population and its composition.It should be noted in the talk on the street that he like coherent thought in the Iraqi social fabric and who stood firmly against all conspiracies to try to strip it of fragmentation and high national content.
Consequently, the Al-Rashid Street is a witness and a teacher of civilization built by the governments deliberated on the rule of the country and missed every one of them reflected the hallmarks of al-Baghdadi, the ancient cultural heritage.
The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreThis study aims to reveal the role of one of the artificial intelligence (AI) techniques, “ChatGPT,” in improving the educational process by following it as a teaching method for the subject of automatic analysis for students of the Chemistry Department and the subject of computer security for students of the Computer Science Department, from the fourth stage at the College of Education for Pure Science (Ibn Al-Haitham), and its impact on their computational thinking to have a good educational environment. The experimental approach was used, and the research samples were chosen intentionally by the research community. Research tools were prepared, which included a scale for CT that included 12 items and the achievement test in b
... Show MoreThe aim of the present research is to identify the test wisdom and the engagement with learning and psychological tension among postgraduate students at the University of Samarra according to the variables of the department, gender, age, and whether students are employee or non-employee. The study also attempts to identify the relationship between the test wisdom and the engagement with learning and psychological tension. The research sample consisted of (75) postgraduate students randomly selected from college of Education. The researcher applied the test–wisdom of (Mellman & Ebel) and the scale of engagement with learning preparation by (Al-zaabi 2013). In addition, the researcher used the list of the psychological stress of (Abu
... Show MoreThe research aims to identify the role of the dimensions of financial inclusion in achieving the competitive advantage by An exploratory research of the views of a sample of customers of the 20 Algerian commercial banks, And the relationship between its dimensions (Access dimension, Usage dimension, Quality) And competitive advantage. This research is based on the analytical descriptive approach. The questionnaire was adopted as a main tool in collecting data and information on the sample of 377.
The The research showed several results, the most important of which is a strong correlation between the dimensions of the three financial inclusion combined and the competitive advantage of the Algerian commercial banks, and explained t
... Show MoreAllah legislated marriage and made it dwelling, fellowship and mercy between
the two couples, Prophet Moh'd (peace of Allah and blessing be upon him) ordered a
husband to look after his wife, treat her with full charity and make love with here
every kindly. On the other hand, he ordered a wife to obey her husband and respect
him deeply, nevertheless, some obstacles may sometimes be appeared within the life
of their marriage, this may be caused by either a husband or a wife. This problem is
called lifely disobedience (AL-Noshooz).
In the other words, this means that a wife begins to hate her husband, refuse his orders
and not obey him.
In brief, they hate each other which leads to some marks appear in their
m
A political perusal of Initiations in Declaring Middle East a District vacant of mass Destruction weapons
This research analyses the tweets of Iraqi politicians (leaders) that took place simultaneously with the formation of the Iraqi government after the elections in 2018. The formation of the Iraqi government was considered one of the most critical issues that emerged in the political process to which the Iraqi media as well as social networking sites paid considerable attention. In this regard, Iraqi political leaders have published many tweets concerning the formation of the government, some of them have caused great controversy in the political climate. As Twitter is one of the most digital platforms that have been widely used on the global scale in recent years, politicians have employed it to publish their opinions, ideas, and to excha
... Show MoreThe study aimed to identify the social support and its relation with death anxiety for
olds who are listed at the Palestinian ministry of social affairs in the Jerusalem governorate,
the researcher uses the descriptive method and she bases her research on two types of
criterion: the social support and the criterion of death anxiety, these two criterion are applied
on a stratified random sample, amounted to (184) of the elderly.
The results show no statistical differences in the level of social support for olds who
are listed at the Palestinian ministry of social affairs according to the variables of sex.
Whereas there are statistical differences in the level of social support for those olds according
to the variab
The tax system, like any other system, as a set of elements and parts that complement each other and are interrelated and interact to achieve specific goals, and is a natural reflection of the economic, social and political conditions prevailing in society, and therefore the objectives of tax policy formulated in line with the objectives of economic policy in general, which means that any change in economic policy clearly affects fiscal policy measures and fiscal policy in particular.
The problem of searching for the impact of foreign direct investment in the Iraqi tax system was focused on the study the of foreign direct investment and therole played in developing and improving the economic reality and its implicatio
... Show More