After Hamdallah and his success on the realization of this manuscript (a letter in detail what was said in the parents of the Prophet Ibn Kamal Pasha (d. 940 e) study and investigation I will review some of the results reached in the realization of this manuscript:
1. The hadiths mentioned in this manuscript are mostly placed or weak.
2 - We are not entitled to speak about the silence of the law for saying Almighty ﭽ ﮮ ﮯ ﮰ ﮱ ﯓ ﯔ ﯕ ﯖ ﯗ ﯘ ﯙ ﭼ Table: 101.
3 in which harm to our Holy Prophet وله تع ﮂ ﮃ ﮄ ﮅ ﮆ ﮈ ﮉ ﮊ ﮋ ﮌ ﮍ ﮎ ﭼ parties: 57.
4 Because the parents of the Prophet of the people of the period ordered them to God for the Almighty ﭽ ﯨ ﯩ ﯪ ﯫ ﯬ ﯭ ﭼ Isra: 15.
God bless our Prophet Muhammad and his family and him
The study aims at measuring the dimensions of binding and non-binding social responsibility and its relation to the organizational performance in telecommunication companies in the Republic of Yemen using analytical descriptive approach and questionnaire as a main tool for data collection and comprehensive inventory method.
It has been found that there is a positive effect and significant moral relation between social responsibility with its binding and non-binding dimensions and the organizational performance of telecommunication companies in the Republic of Yemen at a level of significance below (0.05). It has also been found that the correlation between the non-binding social responsibilit
... Show More
The current study is concerned over the benefits from our Prophet ' Surah , these benefits are seven which are : the first : ( The losing , disappointment , weakness in the affairs of those disbelievers ,the second : showing the affairs of the believers in respect to integrity , forgiveness and rest, the third : Indicating the big difference between the believers and disbelievers , each team has his own characteristics that being distinguished from the other, I have explained the benefit that the disbelievers are in a difficult
... Show MoreAs performers in a social world, we communicate with other people by sharing information on many different levels. Each utterance includes linguistic information and conveys much information about the speaker’s identity. Variation in voice quality indexes information about the speaker and marks the speaker’s identity as a unique individual. The present study aims to validate the belief that each individual has an inalienable voice print that can’t be imitated. The study verifies that, even the more similar personality between two individuals, or the close position in society the variance is voice quality. The acoustic analysis is performed via analysing the acoustic parameters namely: the fundamental frequency, amplitude, inten
... Show MoreThe subject of improving the performance of services provided by government institutions of the important topics at the present time because of their direct contact at the service of citizens and the increased importance of these units as a result of the diversity of activities performed by the so governments of the countries and their people made sure to pay attention to the good use of those allocated to those sectors of resources and spending in the service prescribed and manage the highest level of efficiency and effectiveness and monitor the proper management of the money used in those sectors and evaluate their performance through the Supreme Audit Institutions so that they can play their role oversight and contribute to th
... Show MoreAbstract
The study aims to identify the levels of core competencies dimensions and types of organizational flexibility in the investigated organization, as well as to determine the nature of the relationship and the impact of core competencies dimensions with the process of organizational flexibility. Thus, a number of research questions were presented to express the research problem as follows:
- What is the level of the investigated individuals' awareness to core competencies and organizational flexibility across their dimensions and types in the investigated organization?
- To what extent are core competencies and organizational flexibility available in the Organiz
A localized stenosis or aneurysm is a discontinuity that presents the pulse wave produced by the contracting heart with a reflection site. However, neither wave speed ( c) in these discontinuities nor the size of reflection in relation to the size of the discontinuity has been adequately studied before. Therefore, the aim of this work is to study the propagation of waves traversing flexible tubes in the presence of aneurysm and stenosis in vitro. We manufactured different sized four stenosis and four aneurysm silicone sections, connected one at a time to a flexible ‘mother’ tube, at the inlet of which a single semi-sinusoidal wave was generated. Pressure and velocity were measured simultaneously 25 cm downstream the inlet of th
... Show MoreUse of lower squares and restricted boxes
In the estimation of the first-order self-regression parameter
AR (1) (simulation study)
In the present investigation two different types of fiber reinforced polymer composites were prepared by hand lay-up method using three different parameters (curing temperature, pressing load and fiber volume fraction). These composites were prepared from the polyester resin as the matrix material reinforced with glass fibers as first group of samples and mat Kevlar fibers as the second group, both with different volume fractions (4%, 8%, and 12%) of fibers. They were then tested by tensile strength and impact strength. The main objective in this study is to use Taguchi method for predicting the better parameters that give the better tensile and impact strength to the composites, and then preparing composites at
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show More