Poetry occupied the Arabs in a unique position, especially in the era; ignorant, Umayyad and Abbasid, in addition to its literary and aesthetic dimensions, it is at the forefront of tools and media at the time. The poet appointed society and poetry Diwan Arabs records their exploits and virtues and their valor in the wars... The Prophet Muhammad () realized the importance of poetry, so he took advantage of him in the libel for his Islamic call. In the Umayyad and Abbasid states, poetry had a clear role in social, literary and political life, as the ruling authority used its influence on many poets to be media to support its political theory, by praising the Caliph and his aides, and exposing those who dissented and opposing them. The apostle who truly proves and removes falsehoods, the Ahl al-Bayt (peace be upon them) honored some of their poets; such as Farazdaq and al-Qumit in the Umayyad period; They are peace in both eras, such as Abu al-Aswad al-Doa'li, Ibn Mufriq al-Humayri, Mansour al-Nimri, Abu Tamam, Abu Nawas, Imam Shafi'i, Dick Jinn, and others .. What is the secret in that? As we note that the imams who have positions and prayers for poets are; Ibn Ali al-Baqir, Imam Jaafar ibn Muhammad al-Sadiq, Imam Ali ibn Musa al-Ridha, without the rest of the imams, peace be upon them all .. What is the secret in that too? Love and loyalty to Bani Hashim, as is the case with most of the poems of Shiite poets, even To you the poems in which they addressed the subject of the caliphate - pole millstone - which revolves around the poems of the poets of the Umayyad and Abbasid authorities at the time, the poets of the caliphate surrounded the aura of holiness and spread the doctrine of reparation and authorization, was poems like political statements that adopt the issues of the caliphate and defend and publish the Sultan's opinion that The Caliphate is a divine mandate, and the poets of Ahl al-Bayt answered that the caliphate is the right of the Alawites of Bani Hashim only, through their poetry that they sang in the battlefields with the authority and in the presence of their imams.
The reason that the prayer of some imams is limited only to others, including the prayers of God on them all, is that al-Farazdaq faced authority praising and defending him in front of the carpets, as well as the quantities, pull the traveler to his imams carpets and cows and sincere peace be upon them, praising and defending their right to succession, facing in that authority The narratives did not talk to us that a poet intended the rest of the imams to be peace be upon them, and to travel to praise or lament their grandfather Imam Hussein (حتى) or defend their usurped right, even Offset by a Imam with a position or prayer.
ABCTRACT
Care research examining the relationship between the variables of search presidents (employee training and organizational commitment) to determine the effect of the training of employees in organizations in achieving organizational commitment of employees towards their organizations and by the fact that training is one of the most important activities adopted by the administration and by which can benefit realized for workers and for the organization .ttjsd problem Search lack of training considered as a factor of the important factors in the development of staff skills and development work in many Iraqi companies, including vegetable oils company (where to look), which in turn raises the relevance and commitment
... Show MoreThis work studies with produce of light fuel fractions of gasoline, kerosene and gas oil from treatment of residual matter that will be obtained from the solvent extraction process as by product from refined lubricate to improve oil viscosity index in any petroleum refinery. The percentage of this byproduct is approximately 10% according to all feed (crude oil) in the petroleum refinery process. The objective of this research is to study the effect of the residence time parameter on the thermal cracking process of the byproduct feed at a constant temperature, (400 °C). The first step of this treatment is the thermal cracking of this byproduct material by a constructed batch reactor occupied with control device at a selective range of re
... Show MoreThis work is aiming to study and compare the removal of lead (II) from simulated wastewater by activated carbon and bentonite as adsorbents with particle size of 0.32-0.5 mm. A mathematical model was applied to describe the mass transfer kinetic.
The batch experiments were carried out to determine the adsorption isotherm constants for each adsorbent, and five isotherm models were tested to choose the best fit model for the experimental data. The pore, surface diffusion coefficients and mass transfer coefficient were found by fitting the experimental data to a theoretical model. Partial differential equations were used to describe the adsorption in the bulk and solid phases. These equations were simplified and the
... Show MoreTo assess the contribution of Doppler broadening and examine the
Compton profile, the Compton energy absorption cross sections are
measured and calculated using formulas based on a relativistic
impulse approximation. The Compton energy-absorption cross
sections are evaluated for different elements (Fe, Zn, Ag, Au and Hg)
and for a photon energy range (1 - 100 keV). With using these crosssections,
the Compton component of the mass–energy absorption
coefficient was derived, where the electron momentum prior to the
scattering event caused a Doppler broadening of the Compton line.
Also, the momentum resolution function was evaluated in terms of
incident and scattered photon energy and scattering angle. The res
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreThe Main think that be kept by the speech communication as a concept traditionally being expressed on the subject or a certain idea of a goal came on as needed functional addressed to recipients of benefits or likely to benefit from those rhetorical message through a speech importance and priority of the effect of not less than the effect of that letter, in science content role ends once you absorb it mentally, either in the art of design Valamadmon intellectual embodied through its interaction with the overall shape of the finished design, and often content is associated in the mind of the receiver through a letter communicative linked to the sense or the goal that meant the designer, and try to identify and explain. And meaning i
... Show MoreThis study aims to design unified electronic information system to manage students attendance in Lebanese French university/Erbil, as a system that simplifies the process of entering and counting the students absence, and generate absence reports to expel students who passed the acceptable limit of being absent, and by that we can replace the traditional way of using papers to count absence, with a complete electronically system for managing students attendance, in a way that makes the results accurate and unchangeable by the students.
In order to achieve the study's objectives, we designed an information syst
... Show MoreChristianity rejected abortion, since its inception, it took a luck against abortion, although there is no mention of it in the Bible, as there is no explicit text for abortion in the Old or New Testament and that the early Christians considered abortion a sin in all stages, and beliefs included abortion as an act of murder. What is forbidden in the Ten Commandments is “Thou shalt not kill”, and it is understood that killing here is either plundering one’s personal life (suicide) or stealing another person’s life (killing), or stealing the life of a person who has not yet been born (aborting fetuses). Based on the above, it was necessary for individuals to search for (Abortion in the Christian Religion / Descriptive Study) The resea
... Show MoreThe study aims to examine the emotional innovation, constructive thinking, foresight, and meditation among university students. Besides, attempts to explore the relationship between emotional innovation and constructive thinking, the relationship between emotional innovation and foresight, and meditation, the relationship between constructive thinking and foresight, and meditation, finally, the relationship among emotional innovation, constructive thinking, foresight, and meditation of university students regarding the variables of gender and major. A total of (400) students were selected as a sample for the study. The results revealed that university students have a high level of emotional innovation that induce them to take positive ro
... Show MoreDeveloped and underdevelopment countries, on equal terms, face the problem of budget deficiency. Budget deficiency means that the public expenditure surpasses the public revenues. This, on the international level, is one of the most serious economic problems with many direct effects on the national economy, and depends, basically, on its finance chosen method. Looking for a solution to this problem, for this reason and many other ones, has been highlighted in spite of the many attempts to reduce the role of the governmental expenditure. Budget deficiency can not be attributed to a single unique cause since it is complex phenomenons the causes of which are related to many factors contribute to its occurrence, some of which refer t
... Show More