كَشفت التنقيبات في مدن العراق القديم كالوركاء وماري عـن بقايا أبنية المدارس الموسيقية ( ) . وفي العصر السومري الحديث ( 2000 – 1950 ق. م. ) حُفِظ ما يؤيد وجود مواد المنهج الموسيقي النظري والعملي لعملية التعليم في مدرسة المعبد أو القصر الملكي ، إضافة لبعض اللقى الآثارية كآلات فخارية خاصة بالطفل ، والتي بوساطتها كان يتم تعليم الطفل في البيت ( ) . واحتلت الموسيقى مكانة هامة في حضارات الشرق المختلفة المُتزامنة مع حضارات وادي الرافدين أو التي تلتها . واعتماداً على الآثار والنقوش ، وما جاء في تقارير الإغريق والرومان ، وما صاغَهُ الشعراء والمغنون ، وما ورد في الأمثال والقصص والأساطير ، تمكّن من إقامة بناء فكري شبه متكامل عن العصر الجاهلي، ومكانة الموسيقى في الممالك العربية في أقاليم جنوب شبه الجزيرة العربية و وسطها وشمالها .
اهتم العديد من الباحثين والمحققين في دراسة أبي البركات الأنباري ، كونه أديبا ولغويا ومفسرا ، ونشروا معظم ما وصل إلينا من مؤلفاته ،لكن كما يبدو أن الانباري، مؤرخا ، لم ينل حظه من الاهتمام والدراسة على الرغم من أن كتابه (نزهة الألباب في طبقات الأدباء) قد نشر وحققه صفوة المحققين ([i])وذلك انهم أغفلوا التعريف بمنهجه ودراسته لاسيما وأن التأليف في كتب الطبقات من أهم مناهج الكتابة التاريخية
... Show MoreHamdan tribe had considered one of the biggest tribe in Yemen. It contained many branches, thus, it had distributed in many cities and for this reason , it was different in their warship. it was one of the tribe that had many courageous men
دور مؤسسات التعليم العالي في تعزيز قيم المواطنة في المجتمع العراقي
The Andalusi woman’s poetry forms a point upon which there has been much vagueness and prejudice may be because of the distorted versions that have recorded the women’s heritage. The
The principle of citizenship has international dimensions that affect the application of the principle, such as the structure of the international system, and the control of the concepts of globalization, international organizations which played an important role in the consolidation of this principle.
The problem of the study revolves around the effects of international variables on the principle of citizenship in Kuwait during the period 1991-2018.
The study used several indicators, such as: the rule of law, achieving the principle of separation of powers, the right to form parties, the application of the law of nationality, and racial discrimination, women's rights, and freedom of expression.
This research paper is about synoptic climate specifically with in the upper air layers
using upper air layers maps analysis which are maps of thickness for the level 1000 – 500
MB, that their high average ranges between 100 – 5600 M above surface. This research paper
focuses on studying special and temporal variations of the atmosphere thickness above Iraqaccording
to this study, it is concluded that atmosphere thickness above Iraq increases
towards south with an average of 100 M as compared with north of Iraq. Regarding the
temporal variations, it is concluded that atmosphere thickness during hot months. In July, for
example, the atmosphere thickness becomes thicker than in January with an average of
(250)M
It may say that of difference towards a state that had witnessed the birth of modern party system in England ،and it appear a new case of organization and use ways effecting in general opinion through the election parties that had different in their ideology as Alweel party which dealt with religion related among its members with Buretan with its members participation understandings of free expression of their opinions trying to fight the control of Christ men in a time that Tory party was Enklikanian more than as it was loyalty one .
تحليل الأخطاء النحوية في التواصل الكتابي لدارسي اللغة الاسبانية في العراق
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More