The world went through turmoil before the sixth century AD, and human societies were in conflict and rivalry, each strong state is a weak state-dependent, but the dominant societies made the slave societies to them .. And thus made many societies or civilizations system of classes, and differentiation between members of one community, Weakened its strength and go alone. As the Islamic society in the present weak and weak and falling to the lowest levels of civilizational underdevelopment in the organization of society and social security contrary to what it was Islamic civilization, because of our distance from the heavenly instructions, and this prompted many to walk behind Western ideas aimed at the demolition of Islamic civilization, so I chose An important subject at present may explain to Muslim communities what they were overlooked, which is (the organization of society and its impact on social security) ..
This study investigated the effect of using brainstorming as a teaching technique on the students’ performance in writing different kinds of essays and self regulation among the secondary students. The total population of this study, consisted of (51) female students of the 5th Secondary grade in Al –kawarzmi School in Erbil during the academic year 2015-2016. The chosen sample consisted of 40 female students, has been divided into two groups. Each one consists of (20) students to represent the experimental group and the control one. Brainstorming technique is used to teach the experimental group, and the conventional method is used to teach the control group. The study inst
... Show MoreThe objective of the research is to shed light on the nature of the impact of the activities of the national strategy for poverty alleviation in achieving the goals of sustainable development, and the research problem was represented by Is there an effect of the activities of the national strategy for poverty reduction in achieving the goals of sustainable development? and represents the field of research in the Ministry of Labor and Social Affairs For the years (2012-2016) and the results of the sustainable development goals indicators for the years (2012-2016), the ready-made statistical program (SPSS ver.10) was used to calculate the percentages, multiple linear regression equation, the F test and the R2 coefficient, and the research
... Show MoreRasheed Street has had great importance by the nature of what was seen as being of vital events of a key facility in the Iraqi capital Baghdad since ancient times until now .
And such as cultural and historical memory-rich street for Iraq, pulsating nerve since the beginning of the last century thanks to the commercial and intellectual stature, as well as being a tourist landmark frequented alleys most of the tourists coming to Iraq , which counted for them a source of tourist attraction, given the religious diversity of fungal who excelled by the street, as we find in exchange for his Church of the Virgin Mary, the time which was built in the middle of the Caliphs Mosque towering minarets and promised that the oldest and largest of t
Environmental risk growing Become challenge "and a matter of controversy and concern to many of those concerned with environment, social, economic, and the same happens with the administrative rather than in isolation for this movement, as the issues of climate change Disturbed and troubled him, especially after what caused the risk of destruction, and irresponsibility , chaos, and the futility of resources, crops, fields, nature and homes and reactors, and after what happened in Japan from the scourge of "Hurricane tsunami " and earthquakes successive accompanied him and what became of him by surprise catastrophic affected the economy and the univ
... Show MoreSocietal security is regarded as a basic need for human society through which the stability, progress and prosperity of the nation is measured. It is the guarantor of the safety of individuals and groups from various internal and external dangers, based on the protection of the three pillars: the individual, the family, and society. For decades, Iraq has witnessed the phenomenon of political instability, represented by its entry into several wars, starting with the 1948 war, leading up to the American war on Iraq in 2003. Then, those wars were followed by an era in which corruption and terrorism spread, and this, in turn, led to the fragmentation of the national will and the division of Iraqi public opinion regarding many regional and inte
... Show MoreWith the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreThis study aimed at identifying the extent to which the social worker used the techniques of group discussion in the professional practice with the groups of school activity in the schools of Tubas governorate in light of some variables (gender, years of experience, academic qualification). The analytical descriptive method was used due to its suitability for the objectives of the study. A questionnaire was designed to collect data that included (30) items, distributed in three areas .The validity and reliability of the tool were verified and then distributed to the study sample.
The results of the study showed that the highest averages were in the discussion stage domain, where the pre-discussion stage was m
... Show Moreالكوارث الطبيعية واضرارها على حياة الانسان قديمة لاتحددها فترة زمنية بعينها دون الاخرى ، انها موجودة مند الازل قدم لنا القران الكريم ، والحديث النبوي الشريف ، وكتب التاريخ والجغرافية والبلدان ، وكتب الثقافة العامة وكتب الانواء ، وبعض الكتب المستقلة في الموضوع ومنها كتاب كشف الصلصة في وصف الزلزلة للسيوطي ( ت 911هـ) نمادج لا تحصى من انواع الكوارث الطبيعية ، والتبدلات الجذرية التي حلت بالمجتمعات نتيجة لوقوع
... Show More