The makers of strife exist in every era and time. They differ in how these temptations are created and the methods used in doing so. In our modern era, they are more; This is due to the presence of information technology and its easy availability at their fingertips, as well as the spread of social networking sites, which are rapidly spreading among ignorant groups and groups that are deficient in their use. Which led the makers of sedition to exploit these matters and create various temptations and spread them among peoples and societies. Today, we cannot predict the future of humanity in light of this huge amount of temptation. What the Holy Qur’an mentioned about the types of temptations in its noble verses and their embodiment in several craftsmen was only mentioned in order to take a lesson from those verses and reflect on them Or imitate, to identify their creators, and to beware of similar examples wherever and whenever they exist. This is what we sought to prove and clarify by contemplating the verses of the Holy Qur’an regarding this topic. This is what the research concluded, which includes an introduction, two topics, and a conclusion. A prayer from God Almighty to protect us from the evil of temptations and the evil of their makers and to spare our countries and societies from their evils.
The problem of the current research has been crystallized through the study of the current reality of teaching Islamic Education in the intermediate schools. In order to get realistic results and to built on them the recommendations and suggestion that might help in improving teaching Islamic Education with more effective styles in the intermediate and secondary schools, this research has been formulated with the following question:
What are the common methods and styles used in teaching Islamic Education in the intermediate schools?
The importance of the research can be summarized as follows:
- The importance of the Islamic Education according to its
The aim of this research is to study the effect of using computer
techniques to increase students information at the experimenting the speed
control of dc motor by the magnetic field.
Simulation of the experiment has been used by implementing
“Electronics Workbench” software.
The random sample, included (30) second year electrical department
students, divided into two groups , experimental and control with pre-test and
post-test .
The results showed great advantages for the experimental group
through the use of computer program in the laboratory. The calculated (t) was
(10.6) which was significant and showed statistical differences between the
experimental and control group.
According to the result
Narrators who ruled Bukhari weak
In its great history, the small weak
And their strength Abu Hatim narrated by his son in his book wound and amendment
تواجه الوحدات الاقتصادية في العراق منافسة قوية بسبب مشكلات خاصة بإرتفاع الاسعار وارتفاع تكاليف الانتاج وضعف الاهتمام بدراسة السوق وغيرها من المشاكل ، فضلاً عن استخدام نظام التكاليف التقليدي الذي لا يوفر معلومات ملائمة لقرارات التسعير الامر الذي يتطلب دراسة وتحليل تلك المشكلات ومعالجتها بالاعتماد على تقنيات حديثة بما يمكنها من المنافسة ولهذا جاء هذا البحث والذي يعتبر من المداخل الحديثة لتخفيض التكاليف وم
... Show MoreAromatic Schiff-bases are known to have antibacterial activity, but most of these compounds are sparingly soluble in water. The present work describes the synthesis of new Schiff-bases derived from branched aminosugars. Treatment of 3-Amino-3-Cyano-3-Deoxy-1,2:5,6-Di-O-Isopropylene-α-D-Allofuranose (1) with the aldehydes (2) under reflux in methanol afforded the Schiff-bases (3) in good yields. The new Schiff-bases were in accord with their NMR, IR spectral data and elemental analysis.
Objectives: This study aims to assess and compare the micro-shear bond strength (μSBS) of a novel resin-modified glass-ionomer luting cement functionalized with a methacrylate co-monomer containing a phosphoric acid group, 30 wt% 2-(methacryloxy) ethyl phosphate (2-MEP), with different substrates (dentin, enamel, zirconia, and base metal alloy). This assessment is conducted in comparison with conventional resin-modified glass ionomer cement and self-adhesive resin cement. Materials and methods: In this in vitro study, ninety-six specimens were prepared and categorized into four groups: enamel (A), dentin (B), zirconia (C), and base metal alloys (D). Enamel (E) and dentin (D) specimens were obtained from 30 human maxillary first premolars e
... Show Morea laser ablation Q-switched Nd: YAG laser with a wave-length of 355 nm at a variety of laser pulse energies (E) and deposited on porous silicon (PS). Optical emission spectrometer was used to diagnosed medium air to study gold plasma characteristics and prepared Au nanoparticles. The laser pulse energy influence has been studied on the plasma characteristics in air. The data showed the emergence of the ionic (Au II) spectral emission lines in the gold plasma emission spectrum. XRD has been utilized to examine structural characteristics. Moreover, AFM results 37.2 nm as the mean value of the diameter that is coordinated in a shape similar to the rod that appears for Au NPs, in addition to that, TEM has been an indication of the fact that syn
... Show MoreIn the current work, the mixing ratios ( 𝛿 ) of gamma transitions were calculated from energy levels in the isotopes neodymium 60𝑁𝑎 142−150 populated in the 60Nd 142− 150 (n, n ˊγ) 60Nd 142− 150 using the 𝑎2 ratio method. We used the experimental coefficient (𝑎2 ) for two γ-transitions from the initial state itself, the statistical tensor 𝜌2(𝐽𝑖), associated with factor 𝑎2 , would be the same for the two transitions. The results obtained are in good agreement or within the experimental error with -those previously published. And existing contradictions resulting from inaccuracies in the empirical results of previous work. The current results confirm that the , 𝑎2 − method is used to calculate th
... Show MoreThe widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.
The present paper puts forward an enhancement for the throughput performance metric by p
... Show More