God sent the Prophet Muhammad as a teacher and promising harbinger {that is sent to the illiterate messenger reciting to them His signs and purifies them and teaches them the Book and Wisdom} [Friday: 2]; the wisdom of Baos Prophet him peace be and am back to teach people, - Education and therefore his life was very rich educational tactics And has passed the Prophet in different circumstances and conditions that can be experienced by a teacher or educator in any time, anywhere; there is no case of going through the educator or teacher only finds the same or similar or likened to, or close to it in the life of the Prophet peace be upon him Prophet has lived God's peace be upon his strengths and weaknesses, victory and defeat, he lived orphanhood and paternity .. was deals with every stage and every case including matching. Prophet has treated with the community groups, and called on them, and taught them the best upbringing; with the rigors of their hearts and the roughness of morals, and staleness temperament and repulsion moods, Vaanml Prophet (peace be upon him) what are its staleness, and patience them harm, so they the best nation after it did not have the value and weight of {although they had been before in manifest error that the biography of the Prophet Mohammed and directed educational classes of society and is essential for the breeding source, which besides a great educational school came Avmaz men, and professors of generations, and the masters of thought, and the teachers of morality; one of them was an imam to pray, and a judge in the litigation, and preacher in the communities, and in mufti issues. The most important recommendations that came out of the search: ensuring young people and warn them of places sedition, or delve into the similarities and youth Welfare follow the safety of their faith and concern for the wisdom in the calendar Aauajjaj
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
The current study aims at the extent of determining the interest of the Ministry of Higher Education and Scientific Research and its various departments in the process of strategic foresight, and whether this interest is reflected in its strategic decisions if the study relies on an exploratory and analytical approach and has targeted managers in the higher management within this ministry, and the questionnaire has also been used as a basic tool for collecting For data, the study population was (94), (89) questionnaires were distributed, (86) questionnaires were retrieved, and usable questionnaires amounted to (83). The sub-variable had the highest impact on strategic decision-making (intuition), as this research demonstrated the
... Show MoreBody odour is the smell caused by bacteria feeding on sweat on the skin, especially in the armpit and groin area. Fifty-four volunteers from students and employees of college of Education Ibn Al- Haitham, were surveyed. Data were obtained concerning: subject details and microbial examination. The following conclusions were reached: 1) coagulase negative Staphylococcus was the most common isolate. 2) The most effective antibiotics were amikacin, ciprofloxacin, vancomycin, cephalothin, tobramycin, gentamycin respectively and were least sensitive to methicillin and penicillin G. 3) Alum zirconium and alum chlorohydrate were the most effective antiperspirants.
This research attempts to evaluate the role of the information system by highlighting its importance in providing date and information to the tax administration the process of tax accounting for those who are subject to income tax whether they are individuals or companies where the effective information system provides accurate and reliable information in a timely manner.
At the theoretical part of the research, the research approaches the problem of the research represented in that whether the information system, applied in the General Commission for Taxes, is capable of achieving its role in reducing the phenomenon of tax evasion. The existence of a set of things which in the Commission may lead to increase tax evasion by taxpa
... Show MoreThis study aims to investigate the degree of practicing the motivated classroom evaluation environment for learning and its relationship to different feedback patterns. To achieve the objectives of the study, the correlational descriptive research design was employed. A questionnaire was constructed consisting of two parts: the classroom evaluation environment (13) items, and feedback patterns (24) items on a five-point scale. The psychometric properties of the questionnaire were verified in terms of validity and reliability. The questionnaire was applied to a sample of (265) male and female teachers who work in the second cycle schools for grades (5-10) of basic education in all academic majors in the Governorate of Muscat in the Sultan
... Show MoreThe main aim of this research paper is investigating the effectiveness and validity of Meso-Scale Approach (MSA) as a modern technique for the modeling of plain concrete beams. Simply supported plain concrete beam was subjected to two-point loading to detect the response in flexural. Experimentally, a concrete mix was designed and prepared to produce three similar standard concrete prisms for flexural testing. The coarse aggregate used in this mix was crushed aggregate. Numerical Finite Element Analysis (FEA) was conducted on the same concrete beam using the meso-scale modeling. The numerical model was constructed to be a bi-phasic material consisting of cement mortar and coarse aggregate. The interface between the two c
... Show More The research aims to (identify the applications of pedagogy in art education), the research community included, art education for the primary stage, so the community consisted of (8) main areas in art education, either the research sample was chosen, two main areas (objectives, and content), and included the research methodology (descriptive and analytical), the researcher built the research tool represented (the validity form of the tool) and presented to a group of experts to indicate its validity as well as to measure its stability, To show the results, the researcher used the percentage, and the researcher recommended - modifying the curriculum every period of time, such as every four years, others