After the information revolution that occurred in the Western world, and the developments in all fields, especially in the field of education and e-learning, from an integrated system based on the effective employment of information and communication technology in the teaching and learning processes through an environment rich in computer and Internet applications, the community and the learner were able to access information sources and learning at any time and place, in a way that achieves mutual interaction between the elements of the system and the surrounding environment. After the occurrence of the phenomenon of Covid 19, it led to a major interruption in all educational systems that had never happened before, and the disruption or complete cessation of all joints of life in light of this mysterious virus that paralyzed the important joints in life, health and education, as this phenomenon stimulated the element of innovation, which is a human habit, so education did not stop under these circumstances, but was directed towards distance education, and the work of workshops and seminars using information and communication technology, employing this technology to transfer skills Teaching Arabic, especially to non-native speakers. The most important thing that works on the success of the process of teaching Arabic to non-native speakers is the contribution of language teachers in employing all visual and audio means and electronic platforms that allow full knowledge to reach all learners.
As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show MoreTo maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of
... Show MoreThe insurance activity in the various countries of the world are important indicators of the strength of the country's economy, he came to study the stages compensation insurance settlement against fire and the importance of investing time risk in achieving the payment of compensation speed, and the implications for the continuation of the insured to carry out insurance with the insurance company, whether working within the public sector or the private sector. Hence the research problem in how quickly insurance companies to pay compensation as soon as possible and the return of the insured to carry out its work and make up for what he died from loss. Intentional sample was selected from branches and divisions and Their assistants manager
... Show MoreThe aim of this study is to identify the effectiveness of a rational, emotional, behavioral program in developing self-efficacy to reduce the level of Burnout in 20 teachers of students with autism disorder in Jazan, Saudi Arabia. The proposed program included 12 training sessions. The researcher found that the proposed program has contributed significantly to the development of self-efficacy and reduce the level of Burnout for the targeted subject in this study.
The study examines the religious references of the art of miniatures in the Iranian school "Bahzad model" completed in Iran during the twelfth century AH, according to the controls and characteristics of the authoritative references. The researcher presented the problem of research, its importance, the need for it and its purpose, defined the terms in the research. The theoretical framework came with three investigations. The first topic of the concept of the reference in the field of knowledge, which concluded the most important features of the reference, is that each symbolic existence corresponds to a real existence and symbolic presence is an input to the realization of the reference. The reference then becomes a sign that acts as a
... Show MoreThe research aims to determine what a photograph intends to convey as a visual text. Photographs are not captured randomly, especially those of politicians. Each photograph carries a message, even if interpretations of that message vary from person to person. The research adopts a methodology based on semiotic analysis, applying Laurent Gervero's model to analyze a photograph of the Iraqi Prime Minister Mustafa Al-Kadhimi's visit to Fallujah on the anniversary of the victory over ISIS. The photographs in question constitute a visual language built upon a sequence of iconic symbols and signs. These elements coalesce to give rise to an image centered around a particular theme, one designed to convey a precise messag
... Show MoreFind taught dimension aesthetic in the formation of post-modernism, which is one of the themes of aesthetics in the stream of postmodernism, is problematic because of the lack of provisions and fixed values reinforce the concept of beauty, and put done technical plastic in the circle of evaluation and judgment aesthetic, this research as an attempt to reveal the aesthetic concepts that can be drawn from artistic experiments in the formation of post-modernism, through the development of those concepts viable mainstream.
Search contains four chapters: the first chapter includes a general approach to the research, has been showcasing the research problem and the importance of research and goal of Search: detection dimension aesthetic in