Acquisition provisions in Islamic jurisprudence
The purpose of this research is to demonstrate the impact of banking compliance in combating money laundering and terrorist financing through banks. The phenomenon of money laundering and terrorist financing has received wide attention in the countries of the world and international organizations because of the negative effects this phenomenon has on the global economy as a result of exploiting developments and modern banking operations to pass Money laundering and terrorist financing operations in order to legitimize illegal funds and obliterate their criminal sources, which obliged the banking sector to increase control measures in order to reduce these operations, which conceal money laundering thr
... Show MoreThis research deals with issues of peaceful coexistence in foreign satellite channels directed in the Arabic language, trying to get acquainted with the most prominent of these topics dealt with the programs subject to analysis and the method of dealing with them and the most used journalistic arts in that.
The research adopted the descriptive approach and the method of content analysis for the purpose of studying the research community represented by the program «Shabab Talk» “Youth Talk” in the German channel Deutsche Welle (DW) and the program «Beina Sam wa Amar» “between Sam and Ammar” in the American free channel, by designing the content analysis form to subject
... Show MoreOn of the direct causes which led to the global financial crisis 2008 is decrease or collapse in liquidity of large financial institutions which is reflected on investments of a considerable number of institutions and persons.
This study aim's through out its three sections to explain the disclosure level of financial institutions which affected by Financial Crisis from liquidity information which explained in the statement of cash flow according to Timeliness and Completeness.
The study concluded an important result the company of research sample was disclosure in Timeliness and Completeness from all of accounting information is related in liquidity or that related in result of operations and financial position. The more
... Show MoreThe research aims to formulate a model for research on the dimensions of the Leader-member exchange theory according to the ideas and thoughts of Liden /Maslyn, Hammer and impact on job satisfaction and measure these dimensions at asiacell communications to identify the extent of convergence between theoretical dimensions share leader – member Exchange (LMX) with leadership style used in this company, we have been building scale contains two variables, independent variable Leader-member exchange theory five dimensions (effect , Loyalty, contribution, respect professional, and support) the certified job satisfaction variable dimensions (job security, The Style of management, organizational climate, appreciation, and work itself)
... Show MoreReceipt date:2/17/2021 acceptance date:3/16/2021 Publishing date:12/31/2021
This work is licensed under a Creative Commons Attribution 4.0 International License.
Objective: This paper investigates the contradictions in the decision-making process of the United States, which historically proven to be successful policies in the short term, but in the long term proven to be wanting and failure. Methodology: The paper uses descriptive, historical, comparative method. A
... Show MoreThis research is a theoretical study that deals with the presentation of the literature of statistical analysis from the perspective of gender or what is called Engendering Statistics. The researcher relied on a number of UN reports as well as some foreign sources to conduct the current study. Gender statistics are defined as statistics that reflect the differences and inequality of the status of women and men overall domains of life, and their importance stems from the fact that it is an important tool in promoting equality as a necessity for the process of sustainable development and the formulation of national and effective development policies and programs. The empowerment of women and the achievement of equality between men and wome
... Show MoreThe aim of this paper is to study the Zariski topology of a commutative KU-algebra. Firstly, we introduce new concepts of a KU-algebra, such as KU-lattice, involutory ideal and prime ideal and investigate some basic properties of these concepts. Secondly, the notion of the topology spectrum of a commutative KU-algebra is studied and several properties of this topology are provided. Also, we study the continuous map of this topological space.
This research is about the resources and the way of al-Waqidi in his
researching of al-sira of the Prophet. And what happened in the first of Islam.
This research is about the documents which al-Waqidi had it. Some of it,
which he had visited, was the places, especially the periods which the events had took
place in. He was asking those whom were contemporary to the happenings, from the
sons of al-Sahaba and al-Tabi’een.
Also this research is lightening on the new studies that gave this historian a
good respect during his work, in which he could gave the reality about his authorship.
The research is trying to draw real way of al-Waqidi and what were reported by him,
especially the documents, and what he had s
A new concrete rheometer is introduced including its innovation, actual design, working rules,
calibration, and reliability. A modified design of Tattersall two-point device is created. Some of
components are purchased from local and foreign markets, while other components and the
manufacturing process are locally fabricated. The matching viscosity method of determining the mixer
viscometer constants is demonstrated and followed to relate torque and rotational speed to yield stress
and viscosity (Bingham parameters). The calibration procedures and its calculation are explained.
Water is used as a Newtonian fluid, while; cement paste (cement + water) with w/c ratio equal to
(0.442) is used as a non-Newtonian fluid. Th
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.