Many people, especially among the youth or scholars, wonder about the position of Islam or the scholars of faith on the terminology used by scholars of theology in a certain period of time, and then circulated by people throughout the times and to the present day, such as the terms (the old, the maker, the updated, the cause and the cause) and so on, and this What I felt myself while teaching this subject from some of the students, some of whom consider it blasphemy, and some of them consider it an innovation of speech, and so there were many questions about this subject, which led me to write and research it, after relying on God Almighty, although the research is not long due to the nature of This topic on the one hand, and because I do not like to be lengthy in all the research that I present, and it is known that what is required in such research is to include the evidence and the sayings of the scholars, and then reach a conclusion that reassures them, and this is what I will do in this research, God willing, to ward off the illusion that arises about the term Scholars of theology in the chapter on names and attributes, bearing in mind the Qur’anic rule in the names and attributes represented by the Almighty’s saying:
In The Name of Allah Most Gracious Most Merciful
In this research, I will deal with the significance of the imperative and the disagreement of the fundamentalists in the general requirement by dividing it into an introduction and two sections. , and the appropriate indication.
After the twenty – first century become necessary for us motorcade era in educational a chevements by searching for the best strategies and teaching methods and techniques artotalbagesh resorting to the strategy
Did not use in use in the teaching of the foreseeable material general by voice and teaching perspective for the student of the class fourth science
In particular ,so the researcher asking the question follows:
Can the peer education strategy to have an impact in perspective drawing skill development ?
From here it demonstrated the importance of current research know the impact of p
... Show MoreAbstract
The aim of this research is to identify the general level of teachers’ curriculum expectations in (geography subject as a model), as well as the significance of the difference in the level of teachers’ curriculum expectations in light of the gender variables (male, female), the years of service (10 years or less - more than 10 years), the level of attitudes of fourth-grade literary students towards geography, the level of congruence between teachers’ curriculum expectations and the attitudes of fourth-grade literary students towards geography in light of the variables, the general level of congruence and the level of congruence between teachers’ curriculum expectations and the attitudes of studen
... Show MoreThe study aims detection teaching modalities adopted relationship in Jerash University exactly the classroom, and to achieve the goal of the study was to develop a questionnaire consisting of (39) items, and was achieving validity and reliability have, then sent to a sample of professors made up the university from (122) university professor of the total (172) professor, and they study population.
Study found a relationship between the teaching methods of the four their strategies with classroom management, and as a result the overall average level, while Hspt critical thinking at the highest correlation with classroom discipline management relationship strategy, while the relatio
... Show MoreThis study is an objective literary study of the poems of Abu Dhu'ayb Al-Hudhali and Su'da Bint Al-Shamrdal. It aims to shed light on the philosophy of death in the poems, and the way this philosophy is treated by both poets. Thus, the main prominent poetic images have been addressed and the outstanding ones have been singled out. The study further investigates the intertextuality with other poetic verses and Quranic verses and reviews the deviation in their semantic, syntactic, and phonetic types. The study adopts the historical approach to examine the occasion of the poems by referring to several historical sources that indicate the seniority. It also adopts the and descriptive-analytical approach represented by the use of content anal
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreThis research was one of the terms that used by Al-Bazzar in his musnad and this term was (Al-azza) who launched on some ways and hadiths and I collected those narration, and I have graduated and studied it to access to the meaning which Al-Bazzar want that from this description. In the introduction of the research, I have mention the importance of the subject and the reasons for his selection and also my plan, a preface where I mentioned the definition of Al-Bazzar and his musnad, then in the first section I defined Al-azza linguistically and idiomatically , the second section I studied the hadiths that Al-Bazzar described them with azza ,and then I conclude it with my results that I have reach
... Show MoreInternet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-
... Show MoreThe aerodynamic and elastic forces may cause an oscillation of the structure such as the high frequency of the airfoil surfaces and the dynamic instability occurring in an aircraft in flight and failure may occur at a speed called flutter speed. In this work, analytical and numerical investigations of flutter limits of thin plates have been carried out. The flutter speed of rectangular plates were obtained and compared with some published results. Different design parameters were investigated such as aspect ratio, thickness and their effects on flutter velocity. It was found that the structural mode shape plays an important role in the determination of the flutter speed and the coupling between the bending and torsional mode is the main
... Show MoreThis paper contains an equivalent statements of a pre- space, where are considered subsets of with the product topology. An equivalence relation between the preclosed set and a pre- space, and a relation between a pre- space and the preclosed set with some conditions on a function are found. In addition, we have proved that the graph of is preclosed in if is a pre- space, where the equivalence relation on is open.
On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that
... Show More