The research aims to introduce the elders of Imam Al-Ala who died in the year 761 AH. The study showed the prominent role of women in the eighth century AH in the sciences in general and in the hadith in particular. The woman did not depart from the call of divine education in the Almighty saying: Read in the name of your Lord who created * created mankind * created mankind * And your Lord, the Most Generous, who taught with the pen * taught man unless he knows the captive of verses 1-5.
Families in that era had a prominent role in this concern, especially parents. They were attending boys and girls since their childhood, the lessons of scholars, and the benefit of science, and they were keen to raise their children from childhood to care for science and love of the Prophet’s Hadith.
This indicates that Egypt and the Levant witnessed a clear scientific renaissance, especially after the fall of Baghdad in building mosques and schools where science lessons are held in addition to authoring and heading to education and learning, and it is evidence of scientific awareness and intellectual awakening, so women have a large share of scientific efforts in Sharia sciences .
In this research, I shed light on the elders of Imam Al-Ala’i, who numbered 28 sheikhs, between the greater number of them taken from them and the average and the eyebrows, and I have tried as much as possible to show what Imam Al-Ala’i received in this sheikh from the women who learned about them, in addition to their names and what they received from the knowledge And the year of their birth and their deaths, if any, and the extent of their families ’interest in their education and care for them, and my goal in this work is to show the women of our time the bright image of the women of Islam in preserving science, to conspire with them and follow their approach to achieve the happiness of the world and the hereafter, and I call on the scholars of our time to open their doors for our women to achieve An integrated community based on Ace Q is strong and correct, especially in our modern times, in which the temptations of life abound and plague women and take them out of their humanity to make them a commodity in which desires desires.
In my research, I took the following steps:
The preface: In it I explained the definition of the sheikhdoms and the interest of the scholars in them, and a brief summary of the life of Imam Al-Ala’i and the first topic: I indicated in it the sheikhs of Al-Ala’i who took more than them, and the second topic included his sheikhs who brokered taking them, while the third topic: it includes his sheikhs who are less than taking them. . Conclusion: which included its most important results, sources and references.
The research aims to contribute to the consolidation of scientific knowledge of compliance control and its role in verifying the proper disposal of funds to manage the wheel of the economy towards achieving targeted development and preserving public money, as well as clarifying the role of tax revenues in strengthening the public treasury and achieving social justice. The analytical descriptive approach was adopted in the process of analyzing The quantitative data collected through personal interviews, and the research reached a set of conclusions, the most important of which is the contribution of compliance control according to its three principles. (Transparency, accountability, and inclusiveness) on the availability
... Show More The university professor is the main theme in the educational process, then we must have prepared attention and study, it is the upper hand in achieving the objectives of education and a factor of development of society and its development factors that set it up and increase the efficiency of the duties of universities and development centers and through that evaluation is essential process and Zerorah to improve his performance, especially if they're the evaluation process from the standpoint of their students
research goals
The current research aims to identify:
1. identify the effectiveness of teaching the University of Tikrit from the standpoint of their students
2. to identify the differences in
على الرغم من تحقق ثورة هائلة وطفرة نوعية في مجال تكنلوجيا الاتصالات في دول العالم الا ان بلدنا كان محروما من التمتع بهذه التقنيات الحديثة في ظل النظام السابق, وبعد سقوط النظام ووجود بحبوحة من الحرية، دخلت الكثير من هذه التقنيات الى العراق ومنها الموبايل والانترنيت وغيرها من وسائل الاتصال المتطورة.
ويقول (Smith & Fletcher, 2001) في كتابهما Inside Information
... Show MoreMany reasons combined behind the Standing of U.S. against Britain in its aggression against Egypt in 1956; the consensus of world opinion on the need to stop the aggression and the fear of the Soviet military intervention which mean a new world war.
United States desired to weaken British influences in the region in general to get new oil gains in the Arabian Gulf and Egypt at the expense of Britain. The exiting of Britain from the area served U.S. strategic interests in the Middle East in general and Egypt in particular to keep the flow of oil for U.S advantage.
The United States wanted to keep its image in the region to apply its future political projects including Eisenhower Project, which intended to take the position of Britis
This study aims to identify the most important legislatures and legal frameworks pertaining to advertisement for children. It focuses on the western approach, which is characterized by the variety of its perspectives in presenting issues and in identifying problems. However, if studies show that there is a certain awareness about the advertisement impact on children, it is obvious that most of legislatures reject the laws restricting the broadcast advertising spots intended for children under 12 years of age, with the exception of the Swedish and the Canadian province of Quebec experiences, which opted for total ban on advertising spots broadcast messages targeting children. |
KHalaf Alhmar and what we get from his poem
The current research aimed to investigate the psychometric characteristics of the Arabic version of the Nomophobia scale for the Omani youth. The scale was administered to a random sample of students from public and private universities and colleges in Oman. The research sample consisted of 2507 students, of whom 868 males and 1639 females. The validity of the measure was first checked by presenting the scale to a group of experts in this field. Then the exploratory and confirmatory factor analysis was carried out. The exploratory factor analysis revealed the existence of three main factors: the fear of connectivity loss, the fear of communication loss with others, and the fear of network outages. These factors accounted for 65.6% of the
... Show MoreAssyrian merchants established in the second millennium BC Assyrian commercial settlements in Anatolia, and these settlements had a great cultural value
Faintly continuous (FC) functions, entitled faintly S-continuous and faintly δS-continuous functions have been introduced and investigated via a -open and -open sets. Several characterizations and properties of faintly S-continuous and faintly -Continuous functions were obtained. In addition, relationships between faintly s- Continuous and faintly S-continuous function and other forms of FC function were investigated. Also, it is shown that every faintly S-continuous is weakly S-continuous. The Convers is shown to be satisfied only if the co-domain of the function is almost regular.
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show More