Preferred Language
Articles
/
jperc-1443
Perceptual Curiosity among Students of Religious Schools in Anbar Province
...Show More Authors

Abstract

The aim of the research is to identify the cognitive curiosity of students of religious schools in the al-Anbar Governorate. The sample consisted of (346) students from the secondary stage in religious schools affiliated with the Department of Religious Education and Islamic Studies. The sample included (232) males, (114) females, and (225) represented the intermediate stage, (121) represented the preparatory stage in religious schools. The researcher developed a scale of perceptual curiosity comprising (30) items with three alternatives (always applicable to me, rarely applicable to me, not applicable to me). The results showed that religious school students have a perceptive curiosity; there are no statistically significant differences in the scale due to the variables (sex, stage).

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue May 16 2023
Journal Name
Political Sciences Journal
The Impact of the Internationalization of the Libyan Crisis on the Future of the Political Settlement
...Show More Authors

The internationalization of the Libyan crisis and its accompanying militarization of the conflict have played a vital role in hindering to reach a comprehensive political settlement solution in Libya. The increasing international greediness in the Libyan energy resources and the geopolitical importance of the Libyan State led to the involvement of many international and regional powers in this crisis and transformed the Libyan crisis into “proxy war”.  Moreover, the Turkish direct military intervention in the Libyan crisis is considered as one of the main constraints facing the international and regional efforts to settle the Libyan crisis as a result of the Turkish insistence on its military existence in Libya to preserve i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 03 2020
Journal Name
Political Sciences Journal
The world'srefugeesbetween the aggravation of the situation and the endeavors of international organizations
...Show More Authors

Human witnessed over the centuries many of the important issues faced by the international community was centered on human rights in general and the persecution of refugees, especially according to many forms may be directly or indirectly leaves behind economic crises, social and humanitarian push world countries to rethink the mechanisms and the feasibility of developing agreements and laws and the role of international and regional organizations to protect peoplerefugeestatus.

View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Risk measurement and its role in preparing the target cash flow statement and rationalizing administrative decisions
...Show More Authors

Abstract :

The Aims of this research is to describe the concept of risk, its type and method of measurement, and to clarify the impact of these risks on the expected cash flow statement and the preparation of the target cash flow statement that takes these risks into consideration. Because the local economic environment is exposed to many risks, Therefore, this list will be predictive, which will help the economic unit to make administrative decisions, especially decisions related to operational, investment and financing activities. Therefore, the research problem is based on the fact that most of the local economic units are the list of flows According to the actual basis and not according to the discretionary basis (bud

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
What came as a language in the book to explain Ibn Aqeel on Alfiya Ibn malek
...Show More Authors

It is found in the book "Ibn Aqeel: Alfiya Ibn Malek" that there are some linqustical aspected are related to the native tribal speakers like Tamim or Tie or some others. Sometimes in the book he said "some Arabian said without mentioning the name of the tribe.
As weel, he hasn’t mentioned the accent but he does mention the language. In the book, he has brought back the most important and the biqqest Arabian tribes suchas tribes of Hegaz, Tamim, Hatheyal, son of Anber, Tie, Rabia Bin Wael, Bani Katham, Au there, Bani AL Harth, Bani Kalb, Bani Hgim, Zabid, Hamedan, Alia Qais, Bani Ameer and many others. However, the most mentioned tribes were Hegaz and Tami.
Hence, the importance of the book expiain Ibn Aqeel by mentioning these A

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 15 2019
Journal Name
Al-academy
Virtual Reality Technology and its Uses in Industrial Product Design: فلاح حسن هادي -صلاح نوري محمود
...Show More Authors

The research (Virtual Reality Technology and its Uses in Industrial Product Design) is interested in the virtual reality technology used in the industrial product design and consequently knowing the functions achieved in the industrial product according to the data of that technology which participates in activating the mental and imaginary image of the user which show the parameters of the technical transformation of that product. The terms used in the research have been defined to guide the reader. The second chapter, the theoretical framework consisted of three sections the first is concerned with technology in the industrial design. The second is concerned with the virtual environment and the virtual reality. The thirds chapter consi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 21 2018
Journal Name
Al–bahith Al–a'alami
Ways to face rumors in the social networking site Facebook: Research thesis from the PhD thesis
...Show More Authors

The research deals with the subject of «ways to face rumors in the site of social networking Facebook», a research based on a doctoral thesis, as the research dealt with rumors in the most dangerous type of new media, which sites of social communication with the global community as spreading rumors of all kinds and afflicts everyone who has eyes on him Of the audience of these sites, and aims to identify the rumors on Facebook because it is one of the most popular sites in the world and the strategy of combating the rumors published by Facebook users in their personal pages and groups that organize them, as well as identify methods and methods that can be During which the face of the rumors in the said site and eliminate them t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 08 2024
Journal Name
Al-academy
Intellectual contents in realistic plastic artworks, paintings by Iranian artist Ayman Al-Maliki (An analytical study)
...Show More Authors

The study tagged ( the intellectual implications of the realistic Fine works of art) is a scientific effort to detect modest intellectual and artistic dimensions of the artwork realistic plastic , through some selected artistic productions of the painted work of art of the Iranian artist Ayman al - Maliki , with the result that the researcher collects materials to serve the scientific research topic which comes in three chapters.
First chapter included the general framework of the research (the promise of the research problem and its significance, objectives and limits and some of the terms contained therein).
Second chapter of this research was specified to the theoretical framework which included some of the topics that are dire

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 20 2016
Journal Name
Al-academy
Form and content encryption with digital designs in women's contemporary fabrics: زينب عبد علي محسن الزبيدي
...Show More Authors

My research to study the processes of the creation of shapes and encrypt any encryption in design forms and contents of computer technology as the creative property of definable and renewal, change and transformation process of transformative theme of shape, form and content encryption process in textile designs lets us know the meaning or substance which may be invisible to the encryption in the digital design of fabrics is a recruitment ideas modern and refined through a technique to accomplish the work of a beautiful audiences with novelty and innovation. The search includes four chapters:1Chapter I deal with the problem of research and its current research (form and content encryption with digital designs in women's contemporary fabr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Knowledge Management in Saudi Universities Applied study in Shaqra University
...Show More Authors

  This research aims  to know the reality of  implementation of  Knowledge Management in Saudi Universities Applied  in Shaqra University and to study the difficults whish encountered in applying the Knowledge Management approach.

The study investigated the university staff  in Shaqra, Thadig, and Huraymila branches,  using a questionnaire designed by the researcher to collect the data, sample of (260) members was used, applying the descriptive analytical approach to test the hypothesis by using (SPSS) program.

The study revealed that the first four zero hypothesis are rejected because there is medium approval of the university members on the fo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref