سياسة التعليم لتعزيز الهوية الوطنية في العراق
Communication attribution is a condition of the validity of the hadeeth and that each narrator heard from his Sheik.There are some of the narrators who said to hear who told him and his contemporary, and this narrator is also innocent of the stigma of fraud, but this hearing has no truth.
Due to the importance of the word and because it is the basic building block from which speech is formed, it has become the subject of the attention of many scholars, ancient and modern, especially the Qur’anic vocabulary, which scholars dealt with in various branches of the Arabic language
The best proximity point is a generalization of a fixed point that is beneficial when the contraction map is not a self-map. On other hand, best approximation theorems offer an approximate solution to the fixed point equation . It is used to solve the problem in order to come up with a good approximation. This paper's main purpose is to introduce new types of proximal contraction for nonself mappings in fuzzy normed space and then proved the best proximity point theorem for these mappings. At first, the definition of fuzzy normed space is given. Then the notions of the best proximity point and - proximal admissible in the context of fuzzy normed space are presented. The notion of α ̃–ψ ̃- proximal contractive mapping is introduced.
... Show MoreThe aim of the research is to demonstrate of the relation and the influence of the components of economic intelligence (strategic alertness, information security policy, impact policy) in achieving of economic growth (creativity, competitiveness, quality improvement). The questionnaire was used as a main tool for selected sample. Answers analyzed by using the statistical program (SPSS) to calculate the arithmetic mean, standard deviation, weight percentage, correlation, F test, and Squared factor (R2).
The research derived its importance from the distinguished role of information systems in the work of industrial companies, and its impact toward achieving economic growth rates in its various activities. T
... Show MoreWatermelon is known to be infested by multiple insect pests both simultaneously and in sequence. Interactions by pests have been shown to have positive or negative, additive or non additive, compensatory or over compensatory effects on yields. Hardly has this sort of relationship been defined for watermelon vis-à-vis insect herbivores. A 2-year, 2-season (4 trials) field experiments were laid in the Research Farm of Federal University Wukari, to investigate the interactive effects of key insect pests of watermelon on fruit yield of Watermelon in 2016 and 2017 using natural infestations. The relationship between the dominant insect pests and fruit yield were determined by correlation (r) and linear regression (simple and multiple) analys
... Show Moreتهدف هذه المقالة إلى توضيح أخلاقيات العلم وضوابطه التي يجب على من يعمل في هذا المجال أن يكون متحلي بها حتى يحافظ على القيم والأخلاق الفاضلة والموروثة من الآباء والاجداد والنابعة من الصالحين والاخيار لديم ومة الحياة بأفضل وجه وكما يتمناه الكل وكذلك عدم تجاوز الحدود التي تؤدي إلى الأض ا رر بالمجتمع والبيئة . وتوضيح الحدود الغير مسموح بتجاوزها في مجال العلم والتكنولوجيا ومن هذه الأخلاقيات أو الضوابط التي يجب أن
... Show Moreت نايبتسلاا ثحابلا مدختسا دقو ,ةيداصتقلاا تادحولا ةميق ىلع انوروك ةحئاج لظ يف يلخادلا قيقدتلا ريثأت ةيداصتقلاا تادحولا فادها قيقحت يف مهسي يلخادلا قيقدتلا نا ثحبلا تاجاتنتسا مها تناكو , ثحبلا تاريغتم نيب ةقلاعلا نايبل رطاخملا ةرادأو اهتءافكو اهتيلعاف نيسحتو قيقدتلا عقوم زيزعت ىلع لمعلا تايصوتلا مها تناكو امك, ةمكوحلا تايلمعو ةباقرلاو قيقحتل رارمتسأب ئراوطلا ططخ ثيدحتو ةبقارمو ةحضاو تازفحم ءاشناو ةلمتحم
... Show MoreTechnological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations,
... Show MoreThe research aims to identify the obstacles facing the application of electronic management in our university libraries, including the central library of the University of Baghdad and the central library of Al-Mustansiriya University, the research sample, as they are among the main libraries that used electronic technologies in managing some of their work and in providing their services, and they have a website via the Internet. The research relied on the case study method to identify the obstacles by visiting the two libraries, interviewing their managers and employees responsible for the departments, and answering inquiries about the obstacles that prevent the application of electronic management in order to identify them and find appropr
... Show More