Preferred Language
Articles
/
jcoeduw-1145
(A Message in Nile) For Ahmed هbn Imad ibn Yusuf al-Aqfhasi
...Show More Authors

Ahmed ibn Imad ibn Yusuf al-Aqfhasi (808 AH / 1405 AD) is a small message that speaks about the Nile River in all its sides, despite its limited papers, but it is one of the manuscripts of the important geographical literature for its geographical, historical, religious and grammatical information. it was not limited to the information of the author alore, but taken from many sources below, which added to the importance of the fact that it has saved us the names of the sources that preceded him in mentioning this river with the names of its authors.The method of the Aqfhasi was characterized by scientific methodology in writing and clarity, with reference to some of the myths that people carried in their minds about the Nile River at that time.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
Humanitarian And Natural Sciences Journal
الـوزير محمد بن علي بن خلف ابو غالب الملقب بـ ( فـــخـر الــمـلك ) ( ت 407 هـ - 1016 م ) دراسة تأريخية
...Show More Authors

ــد ً الوزيرالـــوزيــرمحمد بن علي بن خلف ابو غالب الملقب بـ (فـــخـر الــمـلك )(407هـ-1016م)من الشخصيات المهمة،ية البويهية ، المثيراء الامارواعظم وزرالجدل ، وهذا ما سنوضحهفي البحث .ي كون والده ِ كان صيرفيا ً فلادة ونشأة الوزير فخر الملك في بيئة عنيت بالجانب الأدارأسهمت وٌي ديوان مدينة واسط ، أثرِاتهفي صقل قدرالإالع ِ دارية ، فضلا ً عن صفاتهقلية ،ة البويهية علىاء الأماروالشخصية التي جعلته ُ يكون رمز وزرلكل ةارال

... Show More
View Publication
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image
...Show More Authors

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 27 2020
Journal Name
Arab Science Heritage Journal
دور أحمد بن موسى (عليه السلام) في اثبات الإمام علي بن موسى الرضا (ع) نظراً إلى مسألة أزمة الخلافة في الإمامة الشيعية
...Show More Authors

The purpose of this research is to investigate the events and events that took place after the death of Imam Musa al-Kadhim (peace be upon him) and the role of Ahmad ibn Musa (peace be upon him) in the succession of Imam al-Rida (peace be upon him). Will the writer attempt to answer the question about the role

View Publication Preview PDF
Crossref
Publication Date
Thu Aug 27 2020
Journal Name
Arab Science Heritage Journal
تعالق النص القرآني في شعر كعب بن مالك الأنصاري
...Show More Authors

     The Qur'an was revealed with a clear Arabic tongue, and it seized minds, and was astonished by its eloquence and eloquence of tastes, so it was a new dawn, and a nucleus for the birth of a new literature inspired by the tolerant thought of Islam, its fresh words, and its delicate and revealing meanings

View Publication Preview PDF
Crossref
Publication Date
Wed Oct 31 2018
Journal Name
Arab Science Heritage Journal
التراتيب التراتيب الإدارية في تاريخ خليفة بن خياط (240هـ)
...Show More Authors

خليفة بن خياط بن خليفة الشيباني ألليثي العصفري البصري، أبو عمرو، ويعرف بشَبَابه، الفقيه، المُحدَث، الأديب، المؤرخ، النسَابة، وهو سليل أسرةِ اشتهر أبناؤها بالعلم، وأنجبت عدداً من العلماء الأفاضل، الذين عرفوا في ميادين مختلفة، فالجد والأب والحفيد، علماء محدَثون، وبرزوا في علوم عدة ، كان متقناً وعالماً بأيام الناس.

View Publication Preview PDF
Publication Date
Sun Jun 18 2023
Journal Name
Arab Science Heritage Journal
مزار السيد القاسم بن الكاظم في بابل (تاريخه وعمارته)
...Show More Authors

Among the imams who honor the soil of Iraq by embracing their remains is Imam Al-Qasim Ibn al-Imam Musa Ibn Ja'far ibn Muhammad ibn Ali ibn al-Hussein ibn Ali ibn Ali ibn Abu Talib, Amir of the believers Al-Kadhim (may peace be upon him ), the mother of the sons and the mother of his brother Imam Ali ibn Musa al-Rida (may peace be upon him), buried in the Holy QOM (1)It is one of the doors of need for Shiite Muslims All the stories of imams are similar in terms of injustice

View Publication Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Some Methodological Notes on Ibn Al-Jezri Book: Ghayat Al-Nihaya (The Aim of the End): Some Methodological Notes on Ibn Al-Jezri Book: Ghayat Al-Nihaya (The Aim of the End)
...Show More Authors

Abstract
Dame Ngaio Edith Marsh (1899-1982), a writer of detective fiction, was born
at Christchurch, New Zealand. Her hero, Chief Detective Inspector Roderick Alleyn,
appears in her first novel, A Man Lay Dead (1934), and in subsequent novels
including Death and the Dancing Footman (1942). She wrote twenty detective novels.
The Dancing Footman, Thomas, listening to a playful song from the smokingroom's
radio where William lay dead after being killed by his brother, Nicholas,
provides the most suspected guest at Highfold with badly needed alibi. The murderer,
Nicholas, plans an almost perfect crime, but the dance of this footman spoils his
scheme. When Alleyn and his group of policemen stage a show in which the

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Investigation Age message
...Show More Authors

The research is the realization of a manuscript of Abdul Baqi al-Omari nicknamed (Farouk) relative to Al-Faruq Omar bin al-Khattab (Radha) and (Mosli) relative to the city of Mosul in Iraq and (immediate) to improvisation of poetry immediately lived during the era of the Ottomans. Entitled (Picture written by the whole secret sea embroidered crown literary style genius with wisdom poetry and magical prose Hazrat Abdul Baqi Effendi Omari comforting and congratulated to Sheikh Ali Talabani dear) and the manuscript in two versions, the subject of my brothers, in which congratulations and condolences Sheikh Ali Talabani, an administrative position in the Ottoman Empire, And the importance of the manuscript Baha The twist on the hair of Abdul

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 20 1930
Journal Name
College Of Islamic Sciences
Achieving the book of reaction to the end of   Book of alimony from the manuscript of the Forum of the Evangelist Sheikh Ibrahim bin Mohammed bin Ibrahim Halabi (P. 956 e
...Show More Authors

Achieving the Book of Return to the End of the Book of Alimony from the Manuscript of the Forum of the Abhar of the Sheikh (Abraham Bin
Muhammad ibn Ibrahim al-Halabi (d. 956 AH), who was a member of the Hanafi sect, was a long man
Fiqh, interpretation, modernity, Arab sciences, and readings
Hanafi as well as that he was Abid Zahid and the reason for his claim to this book that asked him some
He asked him to take advantage of it
Al-Hanafiya said, mentioning the sources from which he was taken, and presented his opinion and evidence on the correct
He mentioned the issues of the Hanafi jurisprudence in his book according to the chapters of the jurisprudence
Reaction is done to what you have achieved previously in the h

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref