Writing plays an effective role in developing one's thinking and
enhancing Learning. It is, in fact, a means of widening one's own views about
the world for the numerous uses that it can serve (Samuel, 1988:28).
In regard to the unquestionable significance of writing in the teaching –
Learning process, the traditional approach seems to be far from being able to
put such significance into practice. Traditionalists give priority to formulating
students' ideas before using prescribed rhetorical framework and then
submitting the written product for grading. Emphasis is, therefore, limited to the
prewriting stage where a certain topic is explored, and the role of the teacher is
confined to assigning the topic and
Tafsir, ‘interpretation’ is one of the most important sciences the Muslims need. Because Allah, Almighty, revealed the Qur’an to be a way of life for the Muslims in which the healing of what is in the chest, including their goodness and their peasant. Allah says:
“O people, an admonition has indeed come to you from your Lord and a healing for what is in the hearts; and a guidance and a mercy for the believers.”
In order to achieve the goal for which God revealed the Quran must be understood and managed verses:” This is a Book that We have revealed to you abounding in good, that they may ponder over its verses, and that those who have understanding may be mindful.”
The Prophet (PBUH) and his companions understood t
order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs
Purpose :This study seeks to provide the point of view stands on the marketing performance of the banks in the context of Dynamic Equilibrium of marketing. It aims to develop a prototype of measuring marketing performance under the umbrella of marketing dynamic prototype, embodied of the strategic alliance and competition, and the laws and legislation, and to explore any of the dimensions more effective in achieving performance. This study aims to discusses the importance of the Dynamic Equilibrium of marketing and it role in achieving the marketing performance <
... Show MoreIn this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima
This paper includes the application of Queuing theory with of Particle swarm algorithm or is called (Intelligence swarm) to solve the problem of The queues and developed for General commission for taxes /branch Karkh center in the service stage of the Department of calculators composed of six employees , and it was chosen queuing model is a single-service channel M / M / 1 according to the nature of the circuit work mentioned above and it will be divided according to the letters system for each employee, and it was composed of data collection times (arrival time , service time, departure time)
... Show More
Recently Genetic Algorithms (GAs) have frequently been used for optimizing the solution of estimation problems. One of the main advantages of using these techniques is that they require no knowledge or gradient information about the response surface. The poor behavior of genetic algorithms in some problems, sometimes attributed to design operators, has led to the development of other types of algorithms. One such class of these algorithms is compact Genetic Algorithm (cGA), it dramatically reduces the number of bits reqyuired to store the poulation and has a faster convergence speed. In this paper compact Genetic Algorithm is used to optimize the maximum likelihood estimator of the first order moving avergae model MA(1). Simulation results
... Show MoreThe data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show More