Preferred Language
Articles
/
4RYtS4wBVTCNdQwCZfqI
The Secret of Marriage in Christianity A Descriptive Study
...Show More Authors

Marriage is a holly secret in Christian religion .So it id natural that its ceremonies acquired religious form .In general the marriage is contracted by minister of religion in presence of the two parties or by a proxy or presence of parents if it is necessary . And to make the condition of publicity for the marriage ,its procedures must be made before witnesses .Also the minister of religionhave to confirm the agreement of the two parties before beginning the procedures.The marriage ceremonies are made.These procedures are religious traditions that includes praying and make blessings and putting the rings in fingers by thepriest . The marriage is a holly secret performed by the crown pray according to the church religious traditions

Preview PDF
Quick Preview PDF
Publication Date
Mon Mar 02 2020
Journal Name
جامعة بغداد
طقوس الديانة الايزيديــة
...Show More Authors

لما كان الغموض يلفُّ حياة وتاريخ هذه الطائفة الايزيديــــــة ، لاسيما القديم منه ، إذ أنهم يعتمدون التاريخ الشفاهي أو علم الصدور ، وفضلاً عن هذا أنهم ديانة مغلقة ، فقد ارتأى الباحث أن يكتب عن جزئية أو مفردة من تاريخ وديانة هؤلاء القوم ، والتي كما يعتقدـ تكون أكثر دلالة في إعطاء تصور عن حياة الايزيدية وديانتهم ، وقد وسمي البحث بالعنوان الآتي : " طقوس الديانة الايزيدية " حيث تناول الباحث الموضوع من خلال ثلاثة مباح

... Show More
Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
The Impact of the Dominions of Mindfulness on the Organizational Innovation “Descriptive analytical study in some faculties of the University of Baghdad”
...Show More Authors

Research seeks to test the impact of the dimensions of mindfulness on  organizational Innovation, proposed in the light of the review literature on two variables of the research, which referred in General to the dynamic relationship between them, as result of weakness of mindfulness as one important factor driving the diversity of innovation and time, ways to sustain and preserve and then support innovations made by creators, weakness in the overall level of organizational Innovation, this represents the problem research, data collection over designing   identification, distributed to sample Formed from (30) head Department at a number of colleges of the University of Baghdad, results confirms the validity of resea

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 30 2021
Journal Name
Iraqi Journal Of Science
Concealing a Secret Message in a Colour Image Using an Electronic Workbench
...Show More Authors

Steganography is the art of concealing security data in media, such as pictures, audio, video, text, and protocols. The objective of this paper is hiding a secret message in a colour image to prevent an attacker from accessing the message. This is important because more people use the Internet all the time and network connections are spread around the world. The hidden secret message uses two general algorithms that are embedded and extracted. This paper proposes a new algorithm to conceal a secret message in a colour image in LSB. This algorithm includes three phases: 1) dividing the colour image into a number of blocks, 2) concealing the secret message, and 3) transmitting the stego-image from the sender in a multiplexer network and re

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Feb 04 2022
Journal Name
Iraqi Journal Of Science
Hiding and Encryption of Secret Image Using Secret Sharing Scheme
...Show More Authors

With the development of information technology and means for information transfer it has become necessary to protect sensitive information. The current research presents a method to protect secret colored images which includes three phases: The first phase calculates hash value using one of hash functions to ensure that no tampering with or updating the contents of the secret image. The second phase is encrypting image and embedding it randomly into appropriate cover image using Random Least Significant Bit (RLSB) technique. Random hiding provides protection of information embedded inside cover image for inability to predict the hiding positions, as well as the difficult of determining the concealment positions through the analysis of im

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 28 2022
Journal Name
Journal Of The College Of Education For Women
Tracking Some Phonetic Terms in the Arabic Lesson: A Descriptive Analytical Research
...Show More Authors

This research aims to shed light on some phonetic linguistic terms used in the Arabic phonetic lesson for the purpose of monitoring, analyzing and tracking its developments. Such a step helps to standardize and weigh between them. The study follows a descriptive-analytical approach; it surveys the problem of the phonetic linguistic term, and its linguistic exactness. Then, it examines some phonetic terms in the Arabic phonetic lesson, such as phonology and phonology; intensity, looseness and mediation; the production, articulatory, transition, position, and the two vocal chords. One of the most prominent conclusions of the study is that the phonetic linguistic terminology enjoyed a tangible development since its infancy, given that phone

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 05 2014
Journal Name
Journal Of Educational And Psychological Researches
Keeping the Secret When Spouses
...Show More Authors

    Keeping the secret itself of topics for values ​​are positive attribute of personality traits balanced. Objective of this research study of  Keeping the secret when spouses, the study of the theory based on the research and literature that dealt with the subject study is important to mention that there was no study of one Iraqi addressed the study of  Keeping the secret when spouses.

The researcher found the importance of the study of it's Keeping the secret when spouses. the factors that affect family relationships in terms of the stability of the marital relationship and this is reflected positively on the lives of family and community.

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Towards Perceptions building a descriptive and procedural for the knowledge assets at the center of learning and growth for the techniques of Balanced Score card in the light of the strategic map concepts to achieve the strategic and operational: requirements of the contemporary business
...Show More Authors

Abstract:

   Witness the current business environment changes rapidly reflected on the performance of the facility wishing to stay , which is no longer style reaction enough to handle installations with their environment , and quickly began to lose its luster with the emergence of a message and the vision of contemporary business environment from a set of parts interacting with each other and the concept of behavioral includes all dimensions of performance, it is imperative to adopt a system installations influence variables and positive interaction through the development of strategic plans and the use of implementation and follow-up strategies to ensure the effectiveness of the method for meas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 30 2016
Journal Name
جامعة بغداد
العبادات في الديانة البوذية والديانات السماوية الثلاث
...Show More Authors

جاء الكتاب في اربع فصول تناول الفصل التمهيدي نظرة عامة حول تعريف الدين والعبادة والديانة البوذية والفصل الأول تناول الصلاة في الديانة البوذية والديانات السماوية الثلاث وتناول الفصل الثاني الزكاة في الديانة البوذية والديانات السماوية الثلاث وتناول الفصل الثالث الصيام في الديانة البوذية والديانات السماوية الثلاث وتناول الفصل الرابع الحج في الديانة البوذية والديانات السماوية الثلاث وختم البحث بقائمة

... Show More
Preview PDF
Publication Date
Tue Dec 30 2014
Journal Name
College Of Islamic Sciences
Ibn Habib al-Maliki and his views     Jurisprudence      In the book of marriage
...Show More Authors

Allah the Almighty has honored many of his slaves in the high houses for their efforts in building the scientific edifice of this nation, by demonstrating what is needed from the legal provisions for all the relations between them, and the actions that they emanate from. The tasks of the abbreviations and Almstsot, and deposited in the mabahith after various investigations and precious precious matters and showed all the human needs in his life and what is expected to happen, even on the rarest possibilities, and their efforts that left the nation on the cases of Goliath. , And Ask They are in Dar dignity with the best creatures and make us a share of those good things, and Odamna to obey Him and His pleasure until death, and forgive us

... Show More
View Publication Preview PDF