The research in Islamic history is considered a title for the glory of the nation and a mirror for the intellectual and mental maturity of the men of the Islamic state who played an important role in saving humanity from darkness to light and from ignorance to knowledge and to show their position in building the Islamic state, and to highlight the importance of their conquests of neighboring cities and the expansion of Islam, and for this reason they appear The importance of writing on the topic (The Battle of Dumat al-Jandal and its impact on the era of the Prophethood and the Rightly Guided Caliphate). The reason for choosing this topic was to show the status of Dumat al-Jandal and its importance in the Islamic state and its great role in driving away the specter of the Byzantine enemy that was threatening the Islamic state at the time.
Transportation Sector classified as one of the services sectors which is without the production activities cannot be complete its rule. Is act asmoving actions which operate at production and non production goals for the organization and individuals insides the country and with others, that is why this sector act as one of the main which is occupied an important status on the way the economic activities and on the level of the economic institutions the transportation work on transforming all the commodities and products from productions locations to consumption location then its effect the productivity process and create the location utility and on the level of economic it considered as one of the economic supportive structure an
... Show MoreBackground: Adolescence is one of the most dynamic stages of human development. However, Oral health is an integral part of public health, significantly impacts on the quality of life. OHE program is an important issue that should be given to them. The aim of this study was to evaluate oral health outcomes on adolescents' oral health by teachers and mothers Materials and Methods: The study was carried out in seven schools of Diyala - Baquba city. This 14-weeks duration study assessed the effectiveness of school OHE program on oral hygiene status, gingival health, and halitosis assessment of 80, 12 year-old, both genders of school adolescents. From the selected schools, one group was supervised by the teachers and the other was supervised
... Show MoreBackground: Ankylosing spondylitis (AS) is inflammation of the sacroiliac joints and spine, associated with clinical symptoms such as pain and stiffness in the vertebral column, after which, in a considerable number of individuals, new bone growth occurs. Objective: The current research study attempted to find out whether the presence of SNPs in TNF receptor [TNFRSF1A (rs767455), TNFRSF1B (rs1061622)] encoding genes could influence patients' outcomes to etanercept in a specimen of Iraqi AS patients. Patients and methods: Sixty patients with established AS receiving only etanercept were selected to be enrolled in this research with a mean age of 40.75 ± 8.67 years, 51 patients of them were males and only 9 patients were females. Patients we
... Show MoreThe Southern Cowpea Beetle Callosobruchus maculatus (F.) is one of the most widespread insect pests of stored legumes, causing a considerable loss during storage, decreasing the net weight of the crops, and resulting in reduced the quality of the crops. This study has been conducted to determine the lifetime, fertility and life table parameters of C. maculatus by using an alkaloids extract from Moringa oleifera leaves at different concentrations 1000, 2000, and 3000 ppm. The result was shown that the lowest survival rate was 49% at a concentration of 1000, 2000 ppm, as compared with the control which was 77%. The lowest reproductive rate (Ro) was 4.76 female/female/generation at the concentration of 1000 ppm, c
... Show MoreThe main aim of the research is to identify the impact of the application of IFRS for SMEs on optimizing the utility of information for financial reports. To answer the questions and test the hypotheses of the research, researchers relied on the descriptive analytical approach. First, the researchers clarified the theoretical aspect through previous studies, and then they analyses d the results of the applied study by testing the hypothesis using the SPSS.
A questionnaire was distributed after evaluation and arbitration by a number of specialists on selected sample. The sample of 120 respondents consists of general managers, department directors, head of departments, accountants, auditors and financial controllers working in the
... Show MoreThe impact of mental training overlap on the development of some closed and open skills in five-aside football for middle school students, Ayad Ali Hussein, Haidar Abedalameer Habe
The absurdity of Orientalist thought and its deviation in interpretation
Quranic text
View and critique
the Current research aims to identify the psychological stressors coping strategies and their relationship to the cognitive motivation among Al-Anbar University students through the following hypotheses: 1) no statistically significant differences at a level (0.05) among the sample according to the instrumental support strategy depending on the variable type and specialization, 2) No statistically significant differences at a level (0.05) among the sample in regard of coping avoiding strategy depending on the variable type and specialization, 3) There is no statistically significant difference at a level (0.05) in cognitive motivation level among Al-Anbar University students, 4) No statistically significant differences at a level (0.05)
... Show MoreTHE PROBLEM OF TRANSLATING METAPHOR IN AN ARTISTIC TEXT (ON THE MATERIAL OF RUSSIAN AND ARABIC LANGUAGES)
The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More