Preferred Language
Articles
/
2hYhS4wBVTCNdQwCdfoK
Secret baptisms among Christian denominations, descriptive study
...Show More Authors

Christian rites and rituals to be performed, not abandon them, and they see it as a sacred duty in Christ's (as) followers, including: (secret baptisms among Christian denominations, descriptive study) baptisms in the Christian Mystery of God of the mysteries of the Church, every Christian must be baptized always resented It was alaimanh, the Guide mentioned in the Bible by Jesus to his disciples ((just go make disciples of all Nations and immersed them in the name of the father and of the son and of the Holy Spirit, teaching them to observe all that I advised you, and here I am with you all days to the end of the age))( And be baptized in the name of the father and the son and the Holy Spirit, and that's what makes this practice through the obligatory Christian enters the Church's human, with death and burial and resurrection of Christ according to their belief, baptism is immersion and spraying with water, and the water symbolizes the death of sin, and out of the water symbolizes life.Holy cleansed, and everyone received the sacrament of baptism a Christian remains until death, in light of what they see.

Preview PDF
Quick Preview PDF
Publication Date
Sun May 01 2016
Journal Name
Iraqi Journal Of Science
Efficient text in image hiding method based on LSB method principle
...Show More Authors

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere

... Show More
View Publication
Publication Date
Thu May 10 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Steganography System Based on Huffman Coding and Fibonacci Decomposition
...Show More Authors

   Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
Data-Driven Approach for Teaching Arabic as a Foreign Language: Eygpt
...Show More Authors

Corpus linguistics is a methodology in studying language through corpus-based research. It differs from a traditional approach in studying a language (prescriptive approach) in its insistence on the systematic study of authentic examples of language in use (descriptive approach).A “corpus” is a large body of machine-readable structurally collected naturally occurring linguistic data, either written texts or a transcription of recorded speech, which can be used as a starting-point of linguistic description or as a means of verifying hypotheses about a language.  In the past decade, interest has grown tremendously in the use of language corpora for language education. The ways in which corpora have been employed in language pedago

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of The College Of Languages (jcl)
""The Story of the Slaughtered in the Poetry of Hava Pinhas-Cohen" תימת העקדה בשירתה של חוה פנחס כוהן" עוזר פרופ' ד''ר שיימא פאדל חמודי
...Show More Authors

במחקר זה אבקש לעסוק בתימת העקדה בשירתה של חוה פנחס כוהן. סיפור העקדה נבחר לעמוד בבסיסה של המחקר ממספר סיבות. ראשית, כיון שהסיפור הוא סיפור משמעותי, מאורע חשוב במסורת היהודית. שנית, כיוון שעניינו אותי מערכות היחסים השונות בסיפור. מערכת היחסים בין יהוה לאברהם, מערכת היחסים בתוך המשפחה ומערכת היחסים בין יצחק לאברהם. במערכות היחסים הללו משכו את תשומת לבי גם אותם דברים שאינם כתובים בתנ״ך (לדוגמה: מה הייתה תגובת שרה

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of The College Of Languages (jcl)
Literature and Novel: Classical novel in comparison to New Novel By Alain Robbe - Grillet: L'Art et le Roman: Le Roman Traditionnel Face au Nouveau Roman Alain Robe- Grillet
...Show More Authors

Modern French novel has gained a distinctive status in the history of French literature during the first half of the twentieth century. This is due to many factors including the new literary descriptive objective style adopted by novelists like Alain Robbe – Grillet that  has long been regarded as the outstanding writer of the nouveau roman, as well as its major spokesman, a representative writer and a leading theoretician of the new novel that has broken the classical rules of the one hero and evolved, through questioning the relationship of man and the world and  reevaluating the limits of contemporary fiction , into  creating a new form of narrative.

Résumé:

En vue de résu

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Steganography in Audio Using Wavelet and DES
...Show More Authors

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 28 2003
Journal Name
رسالة ماجستير
الاعياد في الاديان السماوية
...Show More Authors

جاء تقسيم البحث على ثلاثة مباحث رئيسة يسبقها تمهيد وتعقبها خاتمة ، وتناول المبحث الواحد مطالب متسلسلة بالأرقام ، ثم قائمة بمصادر البحث ومراجعه. تناول التمهيد نظرة تاريخية للأعيان عند الأقوام ، ولاسيما عند العرب في الجاهلية، وتعريف المصطلحات التي تشكل عنوان البحث تناول المبحث الأول ، وعنوانه (الأعيان في الديانة اليهودية) ، عدد تلك الأعياد، شرح الأسباب الموجبة لكل عيد ، وتاريخ الاحتفال به وأسلوبه؛ وغير ذلك مم

... Show More
Preview PDF
Publication Date
Sat Mar 13 2021
Journal Name
Al-nahrain Journal Of Science
Hiding Multi Short Audio Signals in Color Image by using Fast Fourier Transform
...Show More Authors

Many purposes require communicating audio files between the users using different applications of social media. The security level of these applications is limited; at the same time many audio files are secured and must be accessed by authorized persons only, while, most present works attempt to hide single audio file in certain cover media. In this paper, a new approach of hiding three audio signals with unequal sizes in single color digital image has been proposed using the frequencies transform of this image. In the proposed approach, the Fast Fourier Transform was adopted where each audio signal is embedded in specific region with high frequencies in the frequency spectrum of the cover image to sa

... Show More
View Publication
Crossref
Publication Date
Sun Jan 01 2006
Journal Name
Acta Crystallographica Section E
(OC-6-32)-Bis[5-bromo-2-(4-bromophenyldiazenyl) phenyl]dicarbonylruthenium(II)
...Show More Authors

The title compound, [Ru(C12H7Br2N2)2(CO)2], possesses a distorted octahedral environment about the Ru atom, with two cyclometallated 4,40-dibromoazobenzene ligands and two mutually cis carbonyl ligands. The donor atoms are arranged such that the N atoms are respectively trans to a carbonyl ligand and an aryl C atom. Comment The title compound, (I), has been prepared as a minor product of the reaction of Ru3(CO)12 and 4,40-dibromoazobenzene in refluxing n-octane; the major product is the cluster complex Ru3(3-NC6H4Br)2(CO)9 (Willis et al., 2005). Two strong (CO) absorptions at 2039 and 1991 cm1 in the IR spectrum of (I) are consistent with the presence of two mutually cis carbonyl groups. The crystal structure was investigated to ascertai

... Show More
Publication Date
Thu Jan 26 2006
Journal Name
Acta Crystallographica Section E
(OC-6-13)-Bis[5-bromo-2-(4-bromo­phenyl­diazenyl)phen­yl]dicarbonyl­ruthenium(II) with mutually transN-donor atoms
...Show More Authors

The title compound, [Ru(C12H7Br2N2)2(CO)2], possesses a distorted octa­hedral environment about the Ru atom, with two cyclo­metallated 4,4′-dibromo­azobenzene ligands and two mutually cis carbonyl ligands. The donor atoms are arranged such that the N atoms are mutually trans and the aryl C atoms are trans to carbonyl ligands.