Despite the vast areas occupied by deserts in the world, it is still far from the civilized development and development of the other regions, so they became semi-neglected areas that extend to the hand of urbanization only in specific places and for special purposes, due to the harsh natural conditions surrounding it and to the accuracy The ecological balance in it became the greatest enemy of human beings in the desert areas is the same person who paved the way for increased intervention in the exploitation of natural resources and increase the demand for them to drain seriously affect the impact and still on the environmental and climatic conditions and thus living for the inhabitants of these Areas. The main potential for development in the desert areas is varied and varied. It includes agriculture, tourism, wind and sun exploitation, military and scientific site features, industry and mining, and finally human settlement, which are possibilities for one and can be exploited in an exemplary and thoughtful way to serve the process of civilized progress in the world.
تعد الصهيونية المسيحية الداعم الابرز للسيادة الصهيونية اليهودية على القدس، ويستند هذا الموقف الذي تتخذه الصهيونية المسيحية الى مجموعة من المعتقدات التي يشكل الاعتقاد بالعودة الثانية للمسيح وتأسيسه لمملكة سعيدة تدوم لالف عام محورها، ليصبح الاهتمام بمستقبل الشعب اليهودي احد الاركان الاساسية لمعتقدات الاصوليون المسيحيون لاسيما الصهيونية المسحية، فالتفسير الحرفي للكتاب المقدس قادهم الى اعتقاد مفاده: ان عو
... Show MoreAbstract
The relationship between population and development is one of the most interrelated relations in contemporary societies. Therefore it is important focus on the demographic aspects of the population and its integration with developmental aspects, because the population is the makers of development and responsible for its success. The population composition and their qualitative composition are important factors in development. This change in age rate is because of demographic operations which lasted for long time. The change we are talking about is happing currently in Arab cou
... Show MoreThe scientific heritage is an essential part of the civilization of nation , so Nations has focused on this aspect in the construction of civilization. So the Arab prosperous scientific achievements is no exception to this general rule in being an integral part of the composition of the Arab- Islamic civilization part ,and when we read in the Arab –Islamic medicine books ,we find the genius of the Arab and Muslims physicians and their own new methods of treatment they use music melodies in medication and treatment of patients
عُني العرب منذ القدم بإستعمال الجواهروالأحجار الكريمة ، وإزدادت هذه العناية على مر العصور ، فقد إستعملوا الحلي المتنوعة ، والملابس المطعمة بالجواهر والأحجار الكريمة .
يهدف البحث الحالي الى معرفة أثر انموذج بوسنرفي تحصيل مادة الرياضيات لدى طلاب الصف الثاني المتوسط .
ولتحقيق هدف البحث صاغت الباحثة الفرضية الآتية :
لا يوجد فرق ذو دلالة إحصائية عند مستوى (0,05) بين متوسط درجات طلاب المجموعة التجريبية الذين درسوا مادة الرياضيات وفق انموذج بوسنر، وبين متوسط درجات طلاب المجموعة الضابطة الذين درسوا المادة نفسها بالطريقة الاعتيادية في اخت
... Show Moreان مرتكزات السياسة الخارجية العراقية لمرحلة ما بعد العام 2003 قد عكست توجهات ايجابية قادت الى صياغة مجموعة من الرؤى والتصورات الاستراتيجية الجديدة التي افضت الى اعتماد وتوظيف الوسائل والقنوات الدبلوماسية بوصفها وسائل فعالة وبطريقة متكاملة ومتوازنة من اجل تعزيز مستويات الاداء الفعلي وتحقيق جميع الاهداف المستقبلية للسياسة الخارجية العراقية في ضوء صياغة معادلة مفادها: تدعيم وترصين اداء مؤسسات صنع السياسة ال
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreSome of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of select
... Show More