The research revolves around the methodology of the historian Ibn Wasil
(d.697 AH) in dealing with the Mongolian invasion through his book
“Mafrej al-Karroub fi Akhbar Bani Ayyub
Language is a means of communication among the human beings. Every language that distinguish them from others. However, there is language common that is common of all human beings without discrimination and expression of ideas. Perhaps it is more honest that the usual language.
The research is divided into a preface which speaks about the meaning of body language. Then we speak about body gestures like the eyes, hand, the tongue the heart reaching up the conclusion in which we found that the body language is one of the terms included in the Holy Quran, which has original roots. But this term is recently common and spread in the present time. Most of those who tack
... Show MoreThis paper deals with an important aspect of creativity in the poetry of Ibn Zaidoun, a senior poets Andalusians and writers
Praise be to Allah, Lord of the Worlds and prayers to our master and our beloved Muhammad and to his God and companions.
The Sunnah of the prophet completed the prayer and delivery agreed to accept them as evidence of legislation, and the fundamentalists differed in accepting the news of Sundays in the pieces, and most likely if the hadeeth is proven, and completed the correct conditions there is no objection to accept it in branches and pieces. As for the work of the people of the city is one of the evidence adopted when the imam Malik, who is the Imam of the House of the Prophet's blessed immigration, and scientists differ greatly. If you offer a ruling and the ruling of the Hadith of the individual, and the rule of the work of the
The aim of the research is to determine the impact of evaluating the investment projects in the development and preparation of investment budgets prepared by the economic units, since the investment projects are of an important and vital nature of the economic units, because these projects include the length of time for preparation and implementation and the accompanying period of this risk and uncertainties as well as need To the many funds to complete the project , The process of evaluating the implemented projects, which have been prepared an investment budget previously will contribute to the extent of matching the estimated data with the actual results or deviations, which is a step to avoid these errors in future p
... Show MoreThe field of autonomous robotic systems has advanced tremendously in the last few years, allowing them to perform complicated tasks in various contexts. One of the most important and useful applications of guide robots is the support of the blind. The successful implementation of this study requires a more accurate and powerful self-localization system for guide robots in indoor environments. This paper proposes a self-localization system for guide robots. To successfully implement this study, images were collected from the perspective of a robot inside a room, and a deep learning system such as a convolutional neural network (CNN) was used. An image-based self-localization guide robot image-classification system delivers a more accura
... Show MoreThe research's purpose is to highlight the role that the Approach of the strategic decision play in universities' governorships, assuming that the universities' governorship are definite result that can be reached by modern universities through their active strategic decisions that they take based on the correct way of thinking and the appropriate entrance that achieve the strategic goal of these decisions. The current research depended on two curriculums necessitated by the research requirement which are the analytical description curriculum and compare curriculum, the field research was done in the (Baghdad and Al-Mustansiriya) universities, the samples that were selected were the president, assistants and members of the board'
... Show Moreدراسة حاكمية الجامعات وأثرها في القرار الاستراتيجي
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThe importance of the jurist concentrated on Abu-Abdullah Mohammad Bin Ismael Al- Bukhary who wrote his famous writing (the great history) according to his Modern approach. His style was clearly aimed to record historical events helped narrators reported novel especially through deep reading to be as a sign of special different style from curriculum historians and their ways. It was an approach like an affect charm to the reader and transmitted to a state of grandeur and pride.
The importance of the jurist concentrated on Abu-Abdullah Mohammad Bin Ismael Al- Bukhary who wrote his famous writing (the great history) according to his Modern approach. His style was clearly aimed to record historical events helped narrators reported novel especially through deep reading to be as a sign of special different style from curriculum historians and their ways. It was an approach like an affect charm to the reader and transmitted to a state of grandeur and pride