Since the advent of the sunrise of the immortal message, Islamic legislation has always established justice and the right guidance, and has prevented any perversion, injustice or corruption, with a divine system that called in its course the characteristics of the legislation on its general basis and its ability to develop, progressivity, and paving the way with a collective approach, accompanied by the worldly and moral punishment. When the corrupters went too far, reformers were delayed and values were missed; Mankind has been afflicted with the scourge of injustice and loss, and has lost sight of the approach that the Creator of the world has given to the people of the world, for what would guide them in their affairs sooner and later. Today, corruption spreads and legalizes it, it's a global corruption plan, where countries with enormous potential, dragging the East in general, and our countries in particular, into where the abyss is. This calls for a real awakening in order to diagnose the phenomenon of corruption, to determine the treatment of its stages and to reform what has been corrupted by setting the appropriate controls and indicating the means to combat corruption, by drying up its sources, from the head to the base, and by naming corruption as a crime to identify the useful weapons for it, in modern ways that take the lost man's hand and return him to the path of righteousness. Corruption has no safety in the system of Islam, and a corrupt person does not escape the justice of Islamic legislation, regardless his position
Software cost management is a significant feature of project management. As such, it needs to be employed in a project or line of work. Software cost management is integral to software development failures, which, in turn, cause software failure. Thus, it is imperative that software development professionals develop their cost management skills to deliver successful software projects. The aim of this study is to examine the impact of cost management success factors with project management factors and three agile methodologies – Extreme Programming (XP), Scrum and Kanban methodologies which are used in the Pakistani software industry. To determine the results, the researchers applied quantitative approach through an extensive survey on
... Show More|
Declaration has become today has an important and active and influential role in the recipient public life، and are concentrated advertising on the creativity component manufacture to attract his attention toward what to be announced from a variety products، and is dominated by television commercials tempo and imagination، and display them a variety of ways catches the attention and an impressive simulates the their senses of hearing and sight، to influence in the receiver and the public paid for purchase. Through it crystallization the subject of our research on the importance of creativity in television advertising and effective for attracting the attention of the publi |
Saudi Arabia’s banking sector plays an important role in the country’s development as it is among the leading sectors in the financial sector. Considering, two main Saudi banks (The National Commercial Bank and Saudi American bank), the present study aims to observe the impact of emotional intelligence on employee performance. The components of emotional intelligence affecting employee performance include self-management, relationship management, self-awareness, and social awareness. A quantitative methodology was applied to analyse the survey results of 300 respondents over the period from 2018 to 2019. The results show that there was a significant positive impact of self-management, self-awareness, and relationship manageme
... Show More|
Social networking sites have become very popular since the beginning of the current decade and have become linked to our daily life. We follow the news, Analyses and opinions on the one issue in a way that attracts millions of users and the number grows every secon On Twitter, one of the most important social networking sites, all social groups rushed from the president to the last citizen to open accounts when they found themselves forced to do so . During the recent Gulf crisis, Twitter was buzzing with Twitter, which achieved the largest circulation globally. Instead of serving the issue and directing it to serve the Arab interest, most of the publications were on th |
Rosemary (Rosmarinus officinalis L.) is one of the most economically important species of the family Lamiaceae. Rosemary extract was examined by applying 2.2-diphenyl-1- picrylhydrazyl (DPPH) radical-scavenging assays. The result proved that rosemary extract had a higher antioxidant activity by absorption at a wavelength of 517a nm by using three different concentrations (0.5, 1.0 and 3) mg/ml which performed the absorbance at (2. 314, 0. 211 and 0.296) nm in comparison with control (21.8, 92.2 and 90) nm respectively. Results obtained using chemical detection of the phytochemicals indicated the presence of flavonoids, phenols, saponins, Steroids and cardiac in rosemary water extract. Water extracts of R. officinalis leaves were inves
... Show MoreThe Islamic Banks including the Iraqi ones are often resorted to support their governance frameworks in order to improve its competitiveness in their communities. Where, those banks are looking for activities that enhance their governance; one of these activities is Shariah Audit that provided the auditing capabilities to face of developmental challenges and increase competitiveness. Therefore, the content of this paper, discusses know-how to use the Shariah Audit and its references in support of the Shariah Governance in the Iraqi Isla
... Show MoreThe absurdity of Orientalist thought and its deviation in interpretation
Quranic text
View and critique
The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreToxoplasmosis is the most common, widespread disease in the world which is caused by Toxoplasma gondii.The objective of the current study is to determine the effect of the Toxoplasma gondii infection on male sperm, especially on the mitochondria of sperm for men who suffer infertility and the possibility of a hereditary mutation. Sixty seminal fluid and serum samples were taken from sub- fertile patients who attended Teba center for in vitro fertilization / Babylon and similarly samples were also obtained from healthy individuals as a control group, their ages ranged from 20 to 60 years old during the period from 1st may /2016 till 25th January/2017. All samples subjected to the tests included Macroscopic and microscopic examination, molecu
... Show More