This research is drawn from a doctoral dissertation, studying the approach of Sheikh Abd al-Qadir al-Muhajir al-Sanandji al-Kurdi (1303 AH) on the issue of proving the existence of God Almighty.
Sheikh Abd al-Qadir al-Sanandji was one of the scholars well versed in mental sciences. He has many books, all of them in the sciences of speech and wisdom, and among his books is the book (Raising the Eyebrow in Explanation of Ithbat al-Wajib), which is still a manuscript that has not been printed.
Through this book, the researcher studied the evidence of Sheikh Abdul Qadir to prove the existence of God Almighty, and compared it with the evidence of philosophers and theologians.
At the beginning, he presented a study on the importance of research in proving the existence of God Almighty, and that this issue is the first principle in the belief, and after it comes the rest of the issues of belief in importance.
Kurdish language multifunctional morphemes indicate the different functional morphological, syntactical, and semantic tasks of the morphemes. The present study discusses the multifunctional task of the Morpheme Le in Kurdish Language. The Morpheme Le has marginally been included in other studies, yet up to the present times, there has not been a research inclusively dedicated to thoroughly discuss and clarify its multifunctional aspects. The present study is divided into two chapters:
Chapter one discusses the theoretical aspect of chapter two that is entirely concerned with the practical aspect of the morpheme Le. The first part of chapte
... Show MoreAbstract
The Purpose of This Research is The Main Factors In out Comes Phenomena From Primary School Which in Creased in Lost Period in Iraq And to Find Solutions to The This Problem.
In Order to Achieve Al The Aim The Research Choose a Systematic Random Sample of School Records For Students in Some Primary Schools in Karkh and Rusafa and Year of Study (2010-2015) and Size (40) Samples, included (16) Variable , Collected in Form Prepared by The Research As a Way to Analyze The Data.
Remember to Summarize The (6) Main components Pay a Student to Drop out of Primary Schools in The Province of Baghdad are Arranged As Follows:
... Show MoreCompetencies topic in general , and Administrative competencies in specific, are considered as important subject in the contemporary administrative literature in all countries as well as in public and privet Organizations. For this reason, we have need to study those competencies in many Iraqi Organizations.
Two Organizations wer chosen for this research one of them is the Institution of taxation, and the other is the General company of Electric the data and information related to the research have been collected by desined questioner which has been given to a sample of (50) persions divided eqully between the two maintioned organizations.
The results of the study had differences
... Show MoreAbstract:
This research seeks to test the influence of intellectual capital as an explanatory variable and its components (human capital, structural capital, relational capital) and sustainable competitive performance as a responsive variable and its components (reducing service delivery cycle time, rapid response to market demand, increasing customer satisfaction, providing better Quality of service, increasing market share)” through a field study, and here the research problem was diagnosed in an attempt to answer the following question: Is there awareness among the senior management within the private colle
... Show MoreThis study aims to model the flank wear prediction equation in metal cutting, depending on the workpiece material properties and almost cutting conditions. A new method of energy transferred solution between the cutting tool and workpiece was introduced through the flow stress of chip formation by using the Johnson-Cook model. To investigate this model, an orthogonal cutting test coupled with finite element analysis was carried out to solve this model and finding a wear coefficient of cutting 6061-T6 aluminum and the given carbide tool.
This study deals with The Millstone (1965) which is a dramatic depiction of a single
mother heroine in a classic predicament. This novel is considered as representative of the age
in which it was written. The primary theme is her intense preoccupation with questions of
fatalism and will. The work also involves, both explicitly and implicitly, feminist concerns.
Because the central protagonist is a woman and the society in which she lives is depicted,
accurately, as deeply patriarchal and class-bound, the problem of the individual's capacity for
self-determination is inevitably tied to the feminist perspective.
Increased diseases and obesity currently due to increased production and excessive consumption of foods manufactured from non-food sweeteners without attention to the risk of consuming those additional high calories due to consuming these refreshing products such as juices and other various drinks, especially in the summer season by most segments of Iraqi society, especially workers, children and school students the aim of this study. Therefore, the study designed to replace sucrose with 0.03, 0.04 and 0.05% of each of the white stevia crystals and milled dry stevia leaves in the laboratory manufacture of juices and its effect on the general and sensory characteristics and the extent of their acceptability among the specialized r
... Show MoreA study of the singlet and triplet states of two electron systems in the first excited state was performed using a simple quantum mechanical model, which assigns the 1s,and 2s orbital with two different variational parameters. Our results agree with a high level calculation used by Snow and Bills.
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
research aim :
- The research aimed to investigate the effect of two treatment
methods in the gaining of fourth grade students in geography
object.
- Research hypothesis
there are no statistically significant differences at the level of ( 0.05 )
in the average level of achievement in geography between the first
experimental group ( strengthening lessons ) and the second group
( re- teaching )
no individual differences statically significant at the level of ( 0.05 )
in the average level achievement in geography object of the second
experimental group ( re- teaching ) and the first experimental group
( strengthening lesson )
the research sample : the researcher selected randomly Baghdad