Abstract:
Bajila regarded as descending from Anmar Ibn Nizar. Al-Masudi accepts
Bajila and Khath”am as being of Nizar, and asserts that it was only out of the
enmity that they were said to be from the Yemen.
Al-Ya”qubi tries to harmonize this by assuming that Anmar married a
women of the Yemen and that his sons Bajila and Khath”am are thus
connected to the people of this region only through their mothers line.
Bajila embraced Islam in the period of the prophet. Omar 1 forced this
tribe to go to Iraq instead of Al-_Sham, and gave them the quarter of Al- Saw
ad. Then they prohibited from that quarter by given money as reward that
made them against omar1.
This tribe assisted the forth rightly guided caliph, Ali, in Iraq against the
shames because they were the adherents of Othman besides that Othman
neglected them in spite of their efforts in Qadisiya battle.
Bajila assisted any movement that was against the Umayyad caliphate.
Islam managed Bajila to unite with each while they were separated
among the other Arab tribes, which made the tribe very weak, so one of the
Azd tribe managed to guide one of her branches.
بسبب محدودية الموارد الطبيعية، فأن سكان الخليج ومنذ القدم وجهوا جلّ نشاطاتهم توجهاً بحرياً: صيد الاسماك وصناعة اللؤلؤ العنصر الرئيس في حجم التشغيل، وتكوين الفائض الاقتصادي في المنطقة آنذاك.
لقد تزايدت أهمية هذا النشاط بخاصة بعد النصف الثاني من القرن التاسع عشر، لرواج تجارة اللؤلؤ عالمياً، وأنفتاح الخليج على الدول الاوروبية التي شهدت نهضة صناعية متسارعة، وحيث وصلت الخليج العديد من بضائع
... Show MoreAs s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show MoreTo maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of
... Show MoreThe irony pushes us to inquire about what is in the text of contradiction, irony, suspense, and other acts of paradox, as well as a departure from what is logical, or familiar, that attracts the attention of the addressee, and this is what drives us to introspect the text and interrogate it in order to get to know the intended product of the text or its real or metaphorical intent. On the other hand, the irony is more in the literary text than in the scientific texts. Therefore, critics add the word literature to it in their definition.
As it is represented by the paradox, we will seek to study the paradox of the title and the problematic that it may pose as the beginning of the text, and i
... Show MoreCryptographic applications demand much more of a pseudo-random-sequence
generator than do most other applications. Cryptographic randomness does not mean just
statistical randomness, although that is part of it. For a sequence to be cryptographically
secure pseudo-random, it must be unpredictable.
The random sequences should satisfy the basic randomness postulates; one of them is
the run postulate (sequences of the same bit). These sequences should have about the same
number of ones and zeros, about half the runs should be of length one, one quarter of length
two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones
should be the same. These properties can be measured determinis
The US invasion of Iraq in 2003 unleashed the repressed national aspirations of the Kurdish people. After the colonial powers, especially Britain, failed to establish a homeland of scattered Kurds in Iraq, Turkey, Syria and Iran, Iraq's Kurds managed to establish a semi-independent state in the north of the country Which lasted decades against the central authority in Baghdad in protest against what they call the forced integration of Kurds in the Iraqi state, and to obtain more rights and privileges as partners in this country. The federal region in the Kurdistan region of Iraq has become a reality, and it is eager not to strengthen its authority in return for the authority of the central government, but to annex other areas inhabited b
... Show MoreCan not reach a comprehensive concept for interior design through the use of Harmonization term according transformations experienced by the terms of the variables associated with the backlog of cultures that characterize concepts according to the nature of the users of the spaces in the design output, which necessitates the meaning of the combination of knowledge, art, science, such as the type of perceptions design the Harmonization cognitive science with art to create products of the use of design configurations that help the designer to put such a product within the reality and like the fact that reliable, as well as the rational knowledge tend somehow to the objective specifically in facilitating the substance subject to perceptible
... Show More