The makers of strife exist in every era and time. They differ in how these temptations are created and the methods used in doing so. In our modern era, they are more; This is due to the presence of information technology and its easy availability at their fingertips, as well as the spread of social networking sites, which are rapidly spreading among ignorant groups and groups that are deficient in their use. Which led the makers of sedition to exploit these matters and create various temptations and spread them among peoples and societies. Today, we cannot predict the future of humanity in light of this huge amount of temptation. What the Holy Qur’an mentioned about the types of temptations in its noble verses and their embodiment in several craftsmen was only mentioned in order to take a lesson from those verses and reflect on them Or imitate, to identify their creators, and to beware of similar examples wherever and whenever they exist. This is what we sought to prove and clarify by contemplating the verses of the Holy Qur’an regarding this topic. This is what the research concluded, which includes an introduction, two topics, and a conclusion. A prayer from God Almighty to protect us from the evil of temptations and the evil of their makers and to spare our countries and societies from their evils.
The current research aims to identify the Impact of strategy of modeling in the of deductive thinking and the attitvde towards mathematics among students in the high school stage
through check the following hypotheses:
1.There is no difference statistically significant at the level (0.05) between the scores mean of the experimental group students who have studied according to the modeling strategy and scores of control group students who have studied according to ordinary method in deductive thinking.
2.
... Show Moreيتناول البحث جزاء الاخلال بالوعد بالتعاقد في ضوء تعديل القانون المدني الفرنسي بموجب المرسوم رقم 131 لسنة 2016
Abstract
This research shows the history of political conflicts in Zimbabwe, the
merits of the political struggle for power in this country since the British
colonial period, especially after the British administration announced that
Zimbabwe is a local colony of the British Crown in 1923, as the settlement
process against the wide white deprive local people to own and lease land
and low income, as well as the 1961 Constitution, which granted access to
the white powers in accordance with the authority of the top menu for the
existing lower allocated to blacks.
These events and factors led to a national rejection in Zimbabwe,
which crystallized in the form of parties and political organizations through the
This research aims at studying the websites of Iraqi ministries to determine the extent of the use of electronic communication in the practice of public relations' activities through these sites, which represent a formal means of communication between the ministry and its people.
The research consists of three chapters: chapter one studies the methodological framework of the research; chapter two includes three units: unit one studies technologies of electronic communication including its concept, features and types; unit two studies electronic publications i.e. its concept and features; and unit three deals with designing the electronic websites .it ends with chapter three which is divided into two sections: section one studies the
Abstract The study aimed at reviewing translation theories proposed to address problems in translation studies. To the end, translation theories and their applications were reviewed in different studies with a focus on issues such as critical discourse analysis, cultural specific items and collocation translation.
The ability of insurance companies to achieve goals depends on their ability to meet customers' requirements, and this requires them to identify target markets and respond to needs and wishes of the markets, the skill is to convince the company to operate what is in the interest of the customer if he is convinced the customer service provided to him, he would repeat to deal with, and where the cost of maintaining existing customers is less than the cost of attracting new customers, the insurance companies that is working hard to maintain their customers, the more customer satisfaction with the services provided has increased loyalty and weakened the ability of competitors lured.
&nbs
... Show MoreIn this paper a system is designed on an FPGA using a Nios II soft-core processor, to detect the colour of a specific surface and moving a robot arm accordingly. The surface being detected is bounded by a starting mark and an ending mark, to define the region of interest. The surface is also divided into sections as rows and columns and each section can have any colour. Such a system has so many uses like for example warehouses or even in stores where their storing areas can be divided to sections and each section is coloured and a robot arm collects objects from these sections according to the section’s colour also the robot arm can organize objects in sections according to the section’s colour.
<p>Energy and memory limitations are considerable constraints of sensor nodes in wireless sensor networks (WSNs). The limited energy supplied to network nodes causes WSNs to face crucial functional limitations. Therefore, the problem of limited energy resource on sensor nodes can only be addressed by using them efficiently. In this research work, an energy-balancing routing scheme for in-network data aggregation is presented. This scheme is referred to as Energy-aware and load-Balancing Routing scheme for Data Aggregation (hereinafter referred to as EBR-DA). The EBRDA aims to provide an energy efficient multiple-hop routing to the destination on the basis of the quality of the links between the source and destination. In
... Show MoreElectronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show More