Most of the propositions and researches that dealt with fashions in the Middle East, specifically this region from the world, from a historical perspective have not been sufficient, and were characterized by many aspects of immature thinking, in addition, they have been varied in quality. This can be attributed to many factors including: the focus in the field of researches and Middle East studies is on languages, arts, history, and political thinking of the region. Other factors are the information asymmetry, the differences in sources and references, in addition to differences in the scientific value of these sources added to the difficulty of gathering them at the same time especially that these sources are scattered in many places whether in the literary and non-literary texts written with many Middle Eastern languages.
Starting from this standpoint, this study seeks to address the topic of hijab and burqa from the Islamic perspective from a historical analytical viewpoint and their influence in the Islamic fashion system and their development over successive historical periods within certain geographical frameworks, as they are part of the Islamic dress code, let alone being influenced by social, religious, aesthetic, economic and political levels according to the reflection standards on the spirit of the society over the years, based on a group of Islamic documents, manuscripts drawings and paintings, in addition to some important documents about Arab clothes and fashions in the manuscripts, paintings and ornamental pictures, as well as the illustrations in the Arab books that date back to the period between 5thc. and 20th c.
From this standpoint, this study seeks to address the topic of the “AL- Burqaa” and the veil in the Islamic perspective, from a historical and analytical point of view, and its impact on the Islamic system and its development through successive historical periods in certain geographical frameworks, as part of the Islamic clothing system, as well as its influence on social, or religious levels , Or aesthetic, economic and political, according to the criteria of reflection on the spirit of society over the years. Depending on a set of documents, manuscripts, drawings, and Islamic paintings, as well as some important data on Arab clothing and fashion in manuscripts, paintings, and decorative pictures, and illustrations found in Arabic books dating back to the period between the fifth century and the twentieth century AD. Among urban and rural residents, or in different societies and social groups, whether Arabs or Muslims.
Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show MoreIn recent years, the demand for air travel has increased and many people have traveled by plane. Most passengers, however, feel stressed due to the limited cabin space. In order to make these passengers more comfortable, a personal air-conditioning system for the entire chair is needed. This is because the human body experiences discomfort from localized heating or cooling, and thus, it is necessary to provide appropriate airflow to each part of the body. In this paper, a personal air-conditioning system, which consists of six vertically installed air-conditioning vents, will be proposed. To clarify the setting temperature of each vent, the airflow around the passenger and the operative temperature of each part of the body is investigate
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show MoreIn this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny edge detection
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreExperimental tests were conducted to investigate the thermal performance (cooling effect) of water mist system consisting of 5μm volume median diameter droplets in reducing the heat gain entering a room through the roof and the west wall by reducing the outside surface temperature due to the evaporative cooling effect during the hot dry summer of Baghdad/Iraq. The test period
was Fifty one days during the months May, June, and July 2012. The single test day consists of 16 test hours starting from 8:00 am to 12:00 pm. The results showed a reduction range of 1.71 to 15.5℃ of the roof outside surface temperature and 21.3 to 76.6% reduction in the daily heat flux entering the room through the roof compared with the case of not using w
The organization uses many techniques and methods to ensure that they will succeed and adapted with velocity change in the internal and external environment by decision taking, especially strategic decisions.
Strategic decisions are very important for organization success because it can predict the future and deal with uncertainty, in this circumstances they need accurate and comprehensive information to make effective strategic decision.
To achieve that purpose it must owned successful Strategic Information System ( SIS ) and determined the critical success factors for this system ,which can assisted the worker to focus on the important activities to develop it.
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show More