Many people, especially among the youth or scholars, wonder about the position of Islam or the scholars of faith on the terminology used by scholars of theology in a certain period of time, and then circulated by people throughout the times and to the present day, such as the terms (the old, the maker, the updated, the cause and the cause) and so on, and this What I felt myself while teaching this subject from some of the students, some of whom consider it blasphemy, and some of them consider it an innovation of speech, and so there were many questions about this subject, which led me to write and research it, after relying on God Almighty, although the research is not long due to the nature of This topic on the one hand, and because I do not like to be lengthy in all the research that I present, and it is known that what is required in such research is to include the evidence and the sayings of the scholars, and then reach a conclusion that reassures them, and this is what I will do in this research, God willing, to ward off the illusion that arises about the term Scholars of theology in the chapter on names and attributes, bearing in mind the Qur’anic rule in the names and attributes represented by the Almighty’s saying:
The study aims detection teaching modalities adopted relationship in Jerash University exactly the classroom, and to achieve the goal of the study was to develop a questionnaire consisting of (39) items, and was achieving validity and reliability have, then sent to a sample of professors made up the university from (122) university professor of the total (172) professor, and they study population.
Study found a relationship between the teaching methods of the four their strategies with classroom management, and as a result the overall average level, while Hspt critical thinking at the highest correlation with classroom discipline management relationship strategy, while the relatio
... Show MoreAbstract
The aim of this research is to identify the general level of teachers’ curriculum expectations in (geography subject as a model), as well as the significance of the difference in the level of teachers’ curriculum expectations in light of the gender variables (male, female), the years of service (10 years or less - more than 10 years), the level of attitudes of fourth-grade literary students towards geography, the level of congruence between teachers’ curriculum expectations and the attitudes of fourth-grade literary students towards geography in light of the variables, the general level of congruence and the level of congruence between teachers’ curriculum expectations and the attitudes of studen
... Show MoreAfter the twenty – first century become necessary for us motorcade era in educational a chevements by searching for the best strategies and teaching methods and techniques artotalbagesh resorting to the strategy
Did not use in use in the teaching of the foreseeable material general by voice and teaching perspective for the student of the class fourth science
In particular ,so the researcher asking the question follows:
Can the peer education strategy to have an impact in perspective drawing skill development ?
From here it demonstrated the importance of current research know the impact of p
... Show MoreThis study is an objective literary study of the poems of Abu Dhu'ayb Al-Hudhali and Su'da Bint Al-Shamrdal. It aims to shed light on the philosophy of death in the poems, and the way this philosophy is treated by both poets. Thus, the main prominent poetic images have been addressed and the outstanding ones have been singled out. The study further investigates the intertextuality with other poetic verses and Quranic verses and reviews the deviation in their semantic, syntactic, and phonetic types. The study adopts the historical approach to examine the occasion of the poems by referring to several historical sources that indicate the seniority. It also adopts the and descriptive-analytical approach represented by the use of content anal
... Show MoreThis research sought to present a concept of cross-sectional data models, A crucial double data to take the impact of the change in time and obtained from the measured phenomenon of repeated observations in different time periods, Where the models of the panel data were defined by different types of fixed , random and mixed, and Comparing them by studying and analyzing the mathematical relationship between the influence of time with a set of basic variables Which are the main axes on which the research is based and is represented by the monthly revenue of the working individual and the profits it generates, which represents the variable response And its relationship to a set of explanatory variables represented by the
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreAbstract
The decision maker needs to understand the strategic environment to be addressed through different means and methods. It is obvious that there is a difference between the three strategic environments (conflict environment, peace environment, post- peace environment) in terms of inputs and strategies to deal with each one of them. There is an urgent need to understand each pattern separately, analyze its inputs, and identify the factors and variables that affect the continuity of this situation (conflict, peace, post-peace). It is not appropriate to identify treatment without diagnosis of the condition, so it is very important to understand the type of strategic environment to be dealt with it.
... Show MoreObjective of this work is the mixing between human biometric characteristics and unique attributes of the computer in order to protect computer networks and resources environments through the development of authentication and authorization techniques. In human biometric side has been studying the best methods and algorithms used, and the conclusion is that the fingerprint is the best, but it has some flaws. Fingerprint algorithm has been improved so that their performance can be adapted to enhance the clarity of the edge of the gully structures of pictures fingerprint, taking into account the evaluation of the direction of the nearby edges and repeat. In the side of the computer features, computer and its components like human have uniqu
... Show MoreThe experiments and artistic performances in contemporary Iraqi painting varied between objective simulation and experimentation in other invisible worlds through metaphor and employment to express the latent implications between the human relationship with the tangible and the intangible. The research problem contained the answer to the following questions to understand the formal features in Afifa Laibi's drawings: What are the formal features of Afifa Laibi's drawings and what are the intellectual transformations that she embodied in presenting her subjective subjects? Did the Iraqi and global environmental changes and influences contribute to the forms of Afifa Laibi? The importance of the research also lies in the study of one of th
... Show More