Preferred Language
Articles
/
jcoeduw-326
Features of Historical Approach in Thinking the Grammar In Ibin Ginie: Features of Historical Approach in Thinking the Grammar In Ibin Ginie
...Show More Authors

Abstract:
This research to monitor the features of the historical method in the
thought of a linguistic scientist is known (ibin genieD. 392 AH by offering a
range of grammatical rules presented in his book (the properties and the
nature of their treatment on the basis of the historical method in accordance
with These are an important milestone in facilitating the grammatical rules and
display image "makes it more suitable for the social reality

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Oct 02 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach: An Article Review
...Show More Authors

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr

... Show More
View Publication
Publication Date
Mon Jan 02 2017
Journal Name
European Journal Of Scientific Research
Fast approach for arabic text encryption using genetic algorithm
...Show More Authors

As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res

... Show More
Publication Date
Sat Oct 01 2016
Journal Name
2016 2nd International Conference On Science In Information Technology (icsitech)
Cloud computing sensitive data protection using multi layered approach
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Fri Oct 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach : An Article Review
...Show More Authors

In this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the produ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Aug 01 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Novel Heuristic Approach for Solving Multi-objective Scheduling Problems
...Show More Authors

    In this paper, we studied the scheduling of  jobs on a single machine.  Each of n jobs is to be processed without interruption and becomes available for processing at time zero. The objective is to find a processing order of the jobs, minimizing the sum of maximum earliness and maximum tardiness. This problem is to minimize the earliness and tardiness values, so this model is equivalent to the just-in-time production system. Our lower bound depended on the decomposition of the problem into two subprograms. We presented a novel heuristic approach to find a near-optimal solution for the problem. This approach depends on finding efficient solutions for two problems. The first problem is minimizing total completi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of The College Of Basic Education
Solving Job-Shop Scheduling Problem Using Genetic Algorithm Approach
...Show More Authors

Publication Date
Wed Mar 30 2022
Journal Name
College Of Islamic Sciences
أجـــــوبة الحافظ محمد البرزالي على سؤالات العز ابن الحاجب في الجرح والتعديل
...Show More Authors

ملخص البحث بالعربي

عنوان البحث : أجـــــوبة الحافظ محمد البرزالي على سؤالات العز ابن الحاجب في الجرح والتعديل

يهدف البحث : إلى جمع أجوبة الحافظ أبي عبدالله محمد البرزالي في الجرح والتعديل، ودراستها.

يتكون البحث من : مقدمة، وتمهيد، نص السؤالات، وخاتمة، وفهارس.

المقدمة : تسمية الموضوع، وسبب اختياره، وأهميته .

والتميهد : ترجمة مختصرة للحافظ أبي عبدالله البرزالي، والتعريف بأجوبة الحافظ الب

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 30 2018
Journal Name
College Of Islamic Sciences
الرواة الذين خرج لهم البخاري في صحيحه وجرحهم ابن حبان دراسة نقدية
...Show More Authors

Since the early ages, scientists have been keen on the second source of Islamic law, namely the hadith of the Prophet. They also took from the less disciplined narrators, but they chose from their conversations a selection, and for this some prominent narrators who can be considered that Ibn Habban has been hardened to weaken them. Narrators who avoided Ibn Habban novel They are not true because Ibn Habban neglected her and left her to hurt some narrators who are confident in themselves

View Publication Preview PDF
Publication Date
Tue Sep 04 2018
Journal Name
Al-khwarizmi Engineering Journal
Effect of Carburization Parameters on Hardness of Carburized Steel Using MOORA Approach
...Show More Authors

In this research, (MOORA) approach based– Taguchi design was used to convert the multi-performance problem into a single-performance problem for nine experiments which built (Taguchi (L9) orthogonal array) for carburization operation. The main variables that had a great effect on carburizing operation are carburization temperature (oC), carburization time (hrs.) and tempering temperature (oC). This study was also focused on calculating the amount of carbon penetration, the value of hardness and optimal values obtained during the optimization by Taguchi approach and MOORA method for multiple parameters. In this study, the carburization process was done in temperature between (850 to 950 ᵒC) for 2 to 6

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Early Diagnose Alzheimer's Disease by Convolution Neural Network-based Histogram Features Extracting and Canny Edge
...Show More Authors

Alzheimer's disease (AD) increasingly affects the elderly and is a major killer of those 65 and over. Different deep-learning methods are used for automatic diagnosis, yet they have some limitations. Deep Learning is one of the modern methods that were used to detect and classify a medical image because of the ability of deep Learning to extract the features of images automatically. However, there are still limitations to using deep learning to accurately classify medical images because extracting the fine edges of medical images is sometimes considered difficult, and some distortion in the images. Therefore, this research aims to develop A Computer-Aided Brain Diagnosis (CABD) system that can tell if a brain scan exhibits indications of

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref