This study seeks to uncover the aesthetics of the internal rhythm and its effectiveness in
enriching the poetic text with the music tone at represented in the art of repetition and the
permit and recycling division and put back on the chest and the naturalization interview and
counterpoint.
And try to stand on the impact of internal rhythm to highlight the meaning of spelling and
irony with poet Ibn Bassam Al-Bagdadi and have a close look at the literary and
psychological motivations that led the poet to employ these colors in his ridicule and the
extent of its contribution to intensify the poetic alphabetic flush.
And deepening the meanings and provide poetic text in different aesthetics, there is no doubt
that the old and modern Arabic poem and has focused to install its internal rhythm and justify
reclining on it as phonetic stand to feel hearing with harmony and compatibility and
acceptance.
In this research the Empirical Bayes method is used to Estimate the affiliation parameter in the clinical trials and then we compare this with the Moment Estimates for this parameter using Monte Carlo stimulation , we assumed that the distribution of the observation is binomial distribution while the distribution with the unknown random parameters is beta distribution ,finally we conclude that the Empirical bayes method for the random affiliation parameter is efficient using Mean Squares Error (MSE) and for different Sample size .
Blockchain represents a new promising technology with a huge economic impact resulting from its uses in various fields such as digital currency and banking; malware represents a serious threat to users, and there are many differences in the effectiveness of antivirus software used to deal with the problem of malware. This chapter has developed a coefficient for measuring the effectiveness of antivirus software. This chapter evaluates the effectiveness of antivirus software by conducting tests on a group of protection programs using a folder containing an amount of data. These programs are applied to combat viruses contained in this folder. The study revealed that the effectiveness of antivirus software is as follows: AVG scored 0%,
... Show MoreOne of the Kurdish scholars who have research on the doctrinal issues of the author of this brief message that we are about to achieve; to bring it out better and in order to preserve the Islamic heritage, and revive what can be revived after being close to death by staying in libraries here and there, out of reach of hands, carrying dust Years of forgetting and marginalization, and this letter is the papers in the door of the divorce entitled his author "Iqdar al-dream for those who did not sign divorce commoner," and the name is evident the name, and the intention of the author through writing, where he wrote it to answer some of the knowledgeable among the public at the time So they decreed that there was no divorce from commoners D w
... Show MoreSymptoms of posttraumatic stress disorder are associated with various variables such as the exposure to traumatic events, sex and age. Such events could lead to negative cognitions towards self and the world. These cognitions, in turn, may lead to traumatic related disorders.
The present study aims to identify the percentage of traumatised individuals according to sex and age category variables. It also aims to assess the average of spreading symptoms of posttraumatic stress disorder of traumatised individuals according to sex and age category variables. Likewise, it aims to test variables significance in cognitions towards the world and the self according to the level of the spread of posttraumatic stre
... Show MoreThe research aims to identify the effect of teaching according to the augmented reality on the technique of the visual thinking skills among scientific fifth-grade students in a biology course. In order to achieve the goal of the research, the researcher adopted the experimental approach with the partial set of the two equal groups with the dimensional test of visual thinking skills, The research population represented all the scientific students of the fifth grade for morning government schools affiliated to the General Directorate of Education of Baghdad / Karkh II, alshakerin preparatory for boys was chosen intentionally, in which two groups were chosen for this study, one group is chosen randomly as the control group via lottery, whe
... Show MoreContext and its influence in direction of reference by Abi Hussein Al Basri
In The Name of Allah Most Gracious Most Merciful
Cheating is one of the forbidden actions and reprehensible morals that are forbidden by Islamic law, because it involves an assault on rights, whether they are the rights of God Almighty or the rights of God.
people, or self-rights, and because it involves harming others.
Since the Sunnah of the Prophet is the second source of Islamic law, many of the noble hadiths of the Prophet forbid and prohibit cheating.
This study sheds light on it.
The figure of personality modes determines its privileged style in the use of modern and advanced technological tools in the process of changing and developing in order to keep up with that. The proses of selection and choosing administrators in the appropriate places are the most important functions of senior management because it is easy to adopt factory buildings or establishments But this is a human world as that of machines world. So it is required to have people in the process of changing those who have a time, Knowledge, skill, ability and strong administrative personal skills, those people (leaders) should to put a clear vision for the selection and application of the change efforts and to create the necessary climate and
... Show MoreAbstract
This study was to demonstrate the role-use planning scientific methods is disabled and little used in the planning and follow-up construction of vital projects in the province of Baghdad, including network planning methods, in order to find the optimal time to finish the project in light of the resources available and the budget set for it, in the current research has been used the most prominent network planning methods and two stylistic (CPM / PERT), was the application of the critical path method on standard-design school project (traditional) to draw Action Network according to confirmed times for the activities of the project and account his Crashing time , It was Pert technique applied to the project hemato
... Show MoreThe study aims to identify the degree of implementation of the coronavirus prevention standards (covid-19) in the kingdom of Saudi Arabia and compare it with the families of intellectual disabilities. The study population consisted of all families residing in the Kingdom of Saudi Arabia. To achieve the objectives of the research, the analytical descriptive approach was employed. The study sample consisted of (372) families, among them (84) families with intellectual disabilities, and (288) families without intellectual disabilities. They were chosen from the Saudi community according to what is available for collection in a simple random way, using the standard criteria for the prevention of coronavirus (Covid- 19) Prepared by the resear
... Show More