We try through this research to show the relationship between the crescent and the month in the Koran, and then their importance and their relationship to timing, and the timing of this relationship with people, and the significance of these timings, so we gathered verses that spoke about the family and the month, and we tried to study them in a detailed objective study, so this came The research of five subjects was the first topic introductory research and the time and month, while the remaining four detectives on the verses that talked about the timing of the month, and we have explained the relationship of this timing with people and the significance of these times.
One of the contemporary trends in education and training is the use of educational, competitive and digital games, because one of the most important goals of games is (motivation and challenge). Thus, it ensures the expected reaction from the recipient’s interaction with the game, so we seek his interaction with the content he receives. It is no secret that games distance him from boring content and introduce him to the world of motivation by integrating them with magical elements that make an attractive and desirable game. Naturally, in the case of stimuli and motives that activate the recipient within the context of the educational process procedures, the return is high and especially enjoyable. The aim of the research is to pre
... Show MoreObjectives: To determine the effectiveness of post-abortion family planning counseling program on nurses and midwives' practices and to predict the variables which may effect on their practices Methodology: A quasi experimental study was conducted from 23th April 2017 to 14th March 2018 in three governorates in Middle Euphrates of Iraq: (Holy Karbala, Al - Najef Al Ashraf and Babylon) on nurses and midwives who work at maternity hospitals. Systematic random sampling was used to select 122 nurses and midwives, (60) of them for study group and (62) for control group. A checklist is an instrument that evaluate the practices which included 50 items. Validity of content was determined through reviewing it by (16) experts and reliability of to
... Show MoreIn this research, the focus was placed on estimating the parameters of the Hypoexponential distribution function using the maximum likelihood method and genetic algorithm. More than one standard, including MSE, has been adopted for comparison by Using the simulation method
What distinguishes the athlete in dealing with all stimuli is the ability to understand the cognitive rules through which he acts and directs behavior through thinking and regular planning methods in dealing with the environment in a realistic manner, and this comes through techniques and means based on modernity in obtaining information that makes the athlete arrange in His memory is the programs that are the most important crutch for relying on when he asks for them in applying and executing the skill assignment. One of the enhancers of awareness of variables is the ability of coaches to provide openness in modern ideas to find solutions, through which the player can sense and interpret events and produce outputs for quick and successful
... Show MoreAutorías: Suhair Meteab Munaf, Ali Abdulateef Ali, Mohannad Salman Dawood. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 4, 2022. Artículo de Revista en Dialnet.
The skin temperature of the earth’s surface is referred to as the Land Surface Temperature (LST). the availability of long-term and high-quality temperature records is important for various uses that affect people’s lives and livelihoods. Much valid information was provided to this research from remote sensing technology by using Landsat 8 (L8) imagery to estimate LST for Al-Ahdab oil field in Wasit city in Iraq. The aim of this research is to analyze LST variations based on Landsat 8 data for 2022 (January, April, July, and October). ArcMap 10.8 was used to estimate LST results. The results values ranged from (about 10 C in January to about 46 C in July). The results show that LS
Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show More