Ahmed ibn Imad ibn Yusuf al-Aqfhasi (808 AH / 1405 AD) is a small message that speaks about the Nile River in all its sides, despite its limited papers, but it is one of the manuscripts of the important geographical literature for its geographical, historical, religious and grammatical information. it was not limited to the information of the author alore, but taken from many sources below, which added to the importance of the fact that it has saved us the names of the sources that preceded him in mentioning this river with the names of its authors.The method of the Aqfhasi was characterized by scientific methodology in writing and clarity, with reference to some of the myths that people carried in their minds about the Nile River at that time.
ــد ً الوزيرالـــوزيــرمحمد بن علي بن خلف ابو غالب الملقب بـ (فـــخـر الــمـلك )(407هـ-1016م)من الشخصيات المهمة،ية البويهية ، المثيراء الامارواعظم وزرالجدل ، وهذا ما سنوضحهفي البحث .ي كون والده ِ كان صيرفيا ً فلادة ونشأة الوزير فخر الملك في بيئة عنيت بالجانب الأدارأسهمت وٌي ديوان مدينة واسط ، أثرِاتهفي صقل قدرالإالع ِ دارية ، فضلا ً عن صفاتهقلية ،ة البويهية علىاء الأماروالشخصية التي جعلته ُ يكون رمز وزرلكل ةارال
... Show MoreThe messages are ancient method to exchange information between peoples. It had many ways to send it with some security.
Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.
To send any message text the sender converts message to ASCII c
... Show MoreThe purpose of this research is to investigate the events and events that took place after the death of Imam Musa al-Kadhim (peace be upon him) and the role of Ahmad ibn Musa (peace be upon him) in the succession of Imam al-Rida (peace be upon him). Will the writer attempt to answer the question about the role
The Qur'an was revealed with a clear Arabic tongue, and it seized minds, and was astonished by its eloquence and eloquence of tastes, so it was a new dawn, and a nucleus for the birth of a new literature inspired by the tolerant thought of Islam, its fresh words, and its delicate and revealing meanings
خليفة بن خياط بن خليفة الشيباني ألليثي العصفري البصري، أبو عمرو، ويعرف بشَبَابه، الفقيه، المُحدَث، الأديب، المؤرخ، النسَابة، وهو سليل أسرةِ اشتهر أبناؤها بالعلم، وأنجبت عدداً من العلماء الأفاضل، الذين عرفوا في ميادين مختلفة، فالجد والأب والحفيد، علماء محدَثون، وبرزوا في علوم عدة ، كان متقناً وعالماً بأيام الناس.
Among the imams who honor the soil of Iraq by embracing their remains is Imam Al-Qasim Ibn al-Imam Musa Ibn Ja'far ibn Muhammad ibn Ali ibn al-Hussein ibn Ali ibn Ali ibn Abu Talib, Amir of the believers Al-Kadhim (may peace be upon him ), the mother of the sons and the mother of his brother Imam Ali ibn Musa al-Rida (may peace be upon him), buried in the Holy QOM (1)It is one of the doors of need for Shiite Muslims All the stories of imams are similar in terms of injustice
Abstract
Dame Ngaio Edith Marsh (1899-1982), a writer of detective fiction, was born
at Christchurch, New Zealand. Her hero, Chief Detective Inspector Roderick Alleyn,
appears in her first novel, A Man Lay Dead (1934), and in subsequent novels
including Death and the Dancing Footman (1942). She wrote twenty detective novels.
The Dancing Footman, Thomas, listening to a playful song from the smokingroom's
radio where William lay dead after being killed by his brother, Nicholas,
provides the most suspected guest at Highfold with badly needed alibi. The murderer,
Nicholas, plans an almost perfect crime, but the dance of this footman spoils his
scheme. When Alleyn and his group of policemen stage a show in which the
The research is the realization of a manuscript of Abdul Baqi al-Omari nicknamed (Farouk) relative to Al-Faruq Omar bin al-Khattab (Radha) and (Mosli) relative to the city of Mosul in Iraq and (immediate) to improvisation of poetry immediately lived during the era of the Ottomans. Entitled (Picture written by the whole secret sea embroidered crown literary style genius with wisdom poetry and magical prose Hazrat Abdul Baqi Effendi Omari comforting and congratulated to Sheikh Ali Talabani dear) and the manuscript in two versions, the subject of my brothers, in which congratulations and condolences Sheikh Ali Talabani, an administrative position in the Ottoman Empire, And the importance of the manuscript Baha The twist on the hair of Abdul
... Show MoreAchieving the Book of Return to the End of the Book of Alimony from the Manuscript of the Forum of the Abhar of the Sheikh (Abraham Bin
Muhammad ibn Ibrahim al-Halabi (d. 956 AH), who was a member of the Hanafi sect, was a long man
Fiqh, interpretation, modernity, Arab sciences, and readings
Hanafi as well as that he was Abid Zahid and the reason for his claim to this book that asked him some
He asked him to take advantage of it
Al-Hanafiya said, mentioning the sources from which he was taken, and presented his opinion and evidence on the correct
He mentioned the issues of the Hanafi jurisprudence in his book according to the chapters of the jurisprudence
Reaction is done to what you have achieved previously in the h
Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show More