The personality of the hero Salah al-Din al-Ayyubi (may God have mercy on him) came from the womb of jihad after difficult travails that the Arab Islamic nation experienced through the jihad of its loyal and honest sons who vowed themselves to God in defense of his religion and law, so between 490 AH - 540 AH outstanding jihadi leaders emerged who took upon themselves the responsibility of jihad and mobilizing the nation's energies To fight its enemies - the Franks, the Crusaders - in the Levant, and those leaders succeeded in achieving impressive victories over the Frankish military effort and regained some cities that were usurped by the Franks. Balak bin Bahram, Suqman, and Jakarmish, but these leaders could not maintain a state of unity, so the jihadist efforts of Imad al-Din Zangi came to draw a new state characterized by strength and organization, and succeeded in achieving strategic goals that changed the balance of power in favor of the Islamic military effort and prompted the Franks to assassinate him in the year 541 AH .
However, his son Nur al-Din Mahmud was up to the level of responsibility and a man of the stage that the nation desperately needed for his likes, because he completed the path of jihad drawn by his father, Imad al-Din Zangi. Training and leadership to later be his striking arm in the coming days, and their efforts culminated in uniting the word of the Muslims, ending the Fatimid state, and calling for the Abbasid caliph Al-Mustadi’ in the year 564 AH () Tikrit Castle was in honor of him and his trust in the year 525 AH, but the death of Muhammad and Masoud’s assumption of the sultanate came to end his emirate over Tikrit, as Masoud cut it off to Behrouz the charge of Baghdad and added to him all the adjacent states () and then moved to Mosul to work under the leadership of Imad al-Din Zangi, and it was the birth of Salah al-Din al-Ayyubi In the fortress of Tikrit on the day his father was removed from its emirate, so he moved with his family to Mosul under the care of Imad al-Din Zangi, and he grew up in that jihadi milieu until he emerged as a leading figure ().
The strategies of knowledge management have became the basis in the promotion of core competencies. Therefore gained an increasing prominence. This led the administrations of organizations to work to effectiveness of there strategies, which results to build there core competences through teamwork, empowerment and personal effectiveness of employees. From this arises research problem about the organizations leaders recognize extent of knowledge management strategies which that lead to core competence. In addition the research tray definition the relation and nature of affect between its variables. The research was carried on sample (72) managers from board of supreme audit in Iraq and used statistical tools and methods.
... Show MoreThe Voluntary Obedience has great importance for the modern taxes systems and its management and this is meant the taxpayer whom in charge to pay of his taxes obligations voluntarily , he is very known of himself whereas he prepared his finishing accountings and present them as samples prepared by taxes management and settle the tax sum directly according to specified income , which has an impact to find end to tax evasion as result lead to increase the tax income and achieve the justice for the taxpayer and the state treasury
The aim of the research was to investigate the use of non-parametric tests in the analysis of the questionnaire and how to choose the appropriate test for testing the hypothesis of the study of crime motives in Khartoum State. The data were collected through the primary sources by designing a questionnaire and distributed to a sample of inmates in Khartoum state; the data were analysis by SPSS program using the analytical statistical method through using some of the suitable non-parametric tests for each case. The most important results of the research were: there was significant relationship between the type of crime and the age group therefore, we found that the age group (20-29) was the most frequent crime particularly, the fi
... Show MoreThis work involves synthesis of some new heterocyclic compounds including 1, 3-diazetine. The new Schiff bases [VI] ad derived from 3-((5-hydrazinyl-4-phenyl-4H-1, 2, 4-triazol-3-yl) methyl)-1H-indole [V] which was synthesized by refluxing 5-((1H-indol-3-yl) methyl)-4-phenyl-4H-1, 2, 4-triazole-3-thiol [IV] with hydrazine hydrate in absolute ethanol and this amino compound [V] condensation with different aromatic aldehydes in absolute ethanol to yielded a new Schiff bases [VI] ad. N-acyl compounds [VII] ad were synthesized by addition reaction of acetyl chloride to imine group of Schiff bases in dry benzene. The new diazetine derivatives [VIII] ad synthesized by the reaction of N-acyl compounds [VII] ad with sodium azide in dimethylformamid
... Show MoreCharacterization of the heterogonous reservoir is complex representation and evaluation of petrophysical properties and application of the relationships between porosity-permeability within the framework of hydraulic flow units is used to estimate permeability in un-cored wells. Techniques of flow unit or hydraulic flow unit (HFU) divided the reservoir into zones laterally and vertically which can be managed and control fluid flow within flow unit and considerably is entirely different with other flow units through reservoir. Each flow unit can be distinguished by applying the relationships of flow zone indicator (FZI) method. Supporting the relationship between porosity and permeability by using flow zone indictor is ca
... Show MoreA new generalizations of coretractable modules are introduced where a module is called t-essentially (weakly t-essentially) coretractable if for all proper submodule of , there exists f End( ), f( )=0 and Imf tes (Im f + tes ). Some basic properties are studied and many relationships between these classes and other related one are presented.
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThe research aims to shed light on the financing structure, which is one of the important pillars of financial management in the commercial banking sector, which enhances its financial position through financing its various investments, which is one of the pillars of the successful economy of the commercial banking sector. in which country. The contents of the research variables, which were represented by the independent variable, financing structure, the dependent variable, and investment decisions in commercial banks, which the researcher tried to address, as the research began with a basic variable that depends on diagnosing the impact of the financin
... Show MoreThis research, involved synthesis of some new 1,2,3-triazoline and 1,2,3,4- tetrazole derivatives from antharanilic acid as starting material .The first step includes formation of 2-Mercapto-3-phenyl-4(3H)Quinazolinone (0) through reacted of anthranilic acid with phenylisothiocyanate in ethanol, then compound (0) reaction with chloro acetyl chloride in dimethyl foramamide (DMF) to prepare intermediate S-(α-chloroaceto-2-yl)-3-phenylquinazolin-4(3H)-one (1); compound (1) reacted with sodium azide to yield S-(α-azidoaceto-2-yl)-3-phenylquinazolin-4(3H)-one (2), while Schiff bases (3-10) were prepared from condensation of substituted primary aromatic amines with different aromatic aldehydes in absolute ethanol as a solvent. Compound (2)
... Show More