Preferred Language
Articles
/
jcois-835
 Sheikh Imam Al-Alai women
...Show More Authors

The research aims to introduce the elders of Imam Al-Ala who died in the year 761 AH. The study showed the prominent role of women in the eighth century AH in the sciences in general and in the hadith in particular. The woman did not depart from the call of divine education in the Almighty saying: Read in the name of your Lord who created * created mankind * created mankind * And your Lord, the Most Generous, who taught with the pen * taught man unless he knows the captive of verses 1-5.
        Families in that era had a prominent role in this concern, especially parents. They were attending boys and girls since their childhood, the lessons of scholars, and the benefit of science, and they were keen to raise their children from childhood to care for science and love of the Prophet’s Hadith.
       This indicates that Egypt and the Levant witnessed a clear scientific renaissance, especially after the fall of Baghdad in building mosques and schools where science lessons are held in addition to authoring and heading to education and learning, and it is evidence of scientific awareness and intellectual awakening, so women have a large share of scientific efforts in Sharia sciences .
         In this research, I shed light on the elders of Imam Al-Ala’i, who numbered 28 sheikhs, between the greater number of them taken from them and the average and the eyebrows, and I have tried as much as possible to show what Imam Al-Ala’i received in this sheikh from the women who learned about them, in addition to their names and what they received from the knowledge And the year of their birth and their deaths, if any, and the extent of their families ’interest in their education and care for them, and my goal in this work is to show the women of our time the bright image of the women of Islam in preserving science, to conspire with them and follow their approach to achieve the happiness of the world and the hereafter, and I call on the scholars of our time to open their doors for our women to achieve An integrated community based on Ace Q is strong and correct, especially in our modern times, in which the temptations of life abound and plague women and take them out of their humanity to make them a commodity in which desires desires.
      In my research, I took the following steps:
         The preface: In it I explained the definition of the sheikhdoms and the interest of the scholars in them, and a brief summary of the life of Imam Al-Ala’i and the first topic: I indicated in it the sheikhs of Al-Ala’i who took more than them, and the second topic included his sheikhs who brokered taking them, while the third topic: it includes his sheikhs who are less than taking them. . Conclusion: which included its most important results, sources and references.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The typical path of compliance control in the verification of tax revenues
...Show More Authors

The research aims to contribute to the consolidation of scientific knowledge of compliance control and its role in verifying the proper disposal of funds to manage the wheel of the economy towards achieving targeted development and preserving public money, as well as clarifying the role of tax revenues in strengthening the public treasury and achieving social justice. The analytical descriptive approach was adopted in the process of analyzing The quantitative data collected through personal interviews, and the research reached a set of conclusions, the most important of which is the contribution of compliance control according to its three principles. (Transparency, accountability, and inclusiveness) on the availability

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Educational And Psychological Researches
تقويم فاعلية تدريسي جامعة تكريت من وجهة نظر طلبتهم
...Show More Authors

    The university professor is the main theme in the educational process, then we must have prepared attention and study, it is the upper hand in achieving the objectives of education and a factor of development of society and its development factors that set it up and increase the efficiency of the duties of universities and development centers and through that evaluation is essential process and Zerorah to improve his performance, especially if they're the evaluation process from the standpoint of their students
research goals
The current research aims to identify:
1. identify the effectiveness of teaching the University of Tikrit from the standpoint of their students
2. to identify the differences in

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 01 2009
Journal Name
Journal Of Educational And Psychological Researches
واقع خدمة الانترنت من وجهة نظر المستفيدين( دراسة تحليلية)
...Show More Authors

 على الرغم من تحقق ثورة هائلة وطفرة نوعية في مجال تكنلوجيا الاتصالات في دول العالم الا ان بلدنا كان محروما من التمتع بهذه التقنيات الحديثة في ظل النظام السابق, وبعد سقوط النظام ووجود بحبوحة من الحرية، دخلت الكثير من هذه التقنيات الى العراق ومنها الموبايل والانترنيت وغيرها من وسائل الاتصال المتطورة.

ويقول (Smith & Fletcher, 2001) في كتابهما Inside Information

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
The Position of the United States from Britain in the discussions of British Evacuation from Egypt (1946-1952)
...Show More Authors

Many reasons combined behind the Standing of U.S. against Britain in its aggression against Egypt in 1956; the consensus of world opinion on the need to stop the aggression and the fear of the Soviet military intervention which mean a new world war.
United States desired to weaken British influences in the region in general to get new oil gains in the Arabian Gulf and Egypt at the expense of Britain. The exiting of Britain from the area served U.S. strategic interests in the Middle East in general and Egypt in particular to keep the flow of oil for U.S advantage.
The United States wanted to keep its image in the region to apply its future political projects including Eisenhower Project, which intended to take the position of Britis

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 22 2025
Journal Name
Al–bahith Al–a'alami
THE ROLE OF WESTERN LEGISLATIONS AND LAWS IN PROTECTING CHILDREN FROM ADVERTISEMENT
...Show More Authors

This study aims to identify the most important legislatures and legal frameworks pertaining to advertisement for children. It focuses on the western approach, which is characterized by the variety of its perspectives in presenting issues and in identifying problems. However, if studies show that there is a certain awareness about the advertisement impact on children, it is obvious that most of legislatures reject the laws restricting the broadcast advertising spots intended for children under 12 years of age, with the exception of the Swedish and the Canadian province of Quebec experiences, which opted for total ban on advertising spots broadcast messages targeting children.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
KHalaf Alhmar and what we get from his poem
...Show More Authors

KHalaf Alhmar and what we get from his poem

View Publication Preview PDF
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
The Psychometric Properties of the Arabic Version of Nomophobia Scale among Omani Youth
...Show More Authors

The current research aimed to investigate the psychometric characteristics of the Arabic version of the Nomophobia scale for the Omani youth. The scale was administered to a random sample of students from public and private universities and colleges in Oman. The research sample consisted of 2507 students, of whom 868 males and 1639 females. The validity of the measure was first checked by presenting the scale to a group of experts in this field. Then the exploratory and confirmatory factor analysis was carried out. The exploratory factor analysis revealed the existence of three main factors: the fear of connectivity loss, the fear of communication loss with others, and the fear of network outages. These factors accounted for 65.6% of the

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 27 2022
Journal Name
Arab Science Heritage Journal
قضية قانونية من العهد الاشوري القديم في بلاد الأناضول
...Show More Authors

  Assyrian merchants established in the second millennium BC Assyrian commercial settlements in Anatolia, and these settlements had a great cultural value

View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
On Faintly θ- Semi-Continuous and Faintly δ-Semi-Continuous Functions
...Show More Authors

      Faintly continuous (FC) functions, entitled faintly S-continuous and faintly δS-continuous functions have been introduced and investigated via a -open and -open sets. Several characterizations and properties of faintly S-continuous and faintly -Continuous functions were obtained. In addition, relationships between faintly s- Continuous and faintly S-continuous function and other forms of FC function were investigated. Also, it is shown that every faintly  S-continuous is weakly S-continuous. The Convers is shown to be satisfied only if the co-domain of the function is almost regular.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref