The text has many connotations in the Arabic language, such as vowel points, designation, completion, etc., and the original meaning of the text is to show. The Western text has its owen independent semantic unit .The biblical texts are a mixture of what was reported by the Prophet Moses (peace be upon him) and what the authors described in terms of texts over many centuries.The meaning of the text is guidance and payment, and it is a natural connotation. The religious text for Muslims is divided into peremptory texts that are national proof. The evidence for the meaning of the text is proven by language, and it is not required that the researcher be a jurist. The approach is a factual questionnaire by the researcher according to a specific scientific approach. As for the methodology, it searches for the scientific means that pervade all cognitive processes. One of the mechanisms for understanding the sacred text of Westerners is hermeneutics, which played a fundamental role in understanding religious texts by creating principles and laws for interpretation so that it is logical.
The ancient Iraqis in the Mesopotamian civilization practiced various sports activities and physical exercises to develop their physical fitness until these practices became a part of their lives and accompanied their religious, social, and military celebrations. Music had a presence in many sports scenes, and the presence of musicians and musical instruments with the armies indicated its great role. In the military scene, the research aims to shed light on the archaeological evidence and evidence of the integration of music with the sports and military scene in Mesopotamian civilization and to explore the impact of music in the sports and military scene of Mesopotamian civilization. The historical approach was adopted in collecting and des
... Show MorePraise be to God, Lord of the Worlds, and prayers and peace be upon the Master of Messengers, Muhammad and his family
The good and pure and after his companions
God Almighty said: ( ) Do they not contemplate the Qur’an? If it had been from other than God, they would have found in it much discrepancy. God Almighty has made the well-being of people and their lives linked to faith in it. So what is the need of people today to return to the Book of their Lord so that they may return to the right path that God intended for His servants so that they may attain sustenance? Security and the good life. How could it not be, when many of the nations of the world no longer see security or stability because their leaders and politic
... Show MoreThe problem of research is that there are differences between learners in processing in formation in general and there is variation at the learners level perform scrolling skill of the passes up and down by the volley ball .Therefore the researchers decided to conduct astudy through which identify the relationship between information processing and the skill of scrolling from the top and bottom by the volleyball. The researchers used the descriptive approach by themethod of interconnectivity .Asampleconsist of21 students from first staye in collage of physical education and sports science for Girls(university of Baghdad) and attest has been applied(process information and scroll up and down) on the research sample after the required
... Show MoreIn this research entitled "Internal music in the poetry of guidance in the era of Islam and its artistic and semantic implications" dealt with the following:
Preface, which addressed the importance of internal music in poetry, and its close association with poetry, and the poet himself, to reveal what is touring himself and revolves in his imagination.
Repetition of all kinds: repetition of letters, repetition of words, and repetition of phrases: It showed what this repetition of strengthening the melody, and linking parts of words within the same house, or the poem, and create a special musical atmosphere to spread a certain significance and to confirm the meanings and accompanied by musical accommodation.
Anaphysic
The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show MoreThis article investigates Iraq wars presentation in literature and media. The first section investigates the case of the returnees from the war and their experience, their trauma and final presentation of that experience. The article also investigates how trauma and fear is depicted to create an optimized image and state of fear that could in turn show Iraqi society as a traumatized society. Critics such as Suzie Grogan believes that the concept of trauma could expand to influence societies rather than one individual after exposure to trauma of being involved in wars and different major conflicts. This is reflected in Iraq as a country that was subjected to six comprehensive conflicts in its recent history, i.e. less than half a century; th
... Show MoreAs s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show MoreIn this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima
The purpose of this paper is to identifying the relationship between the moral climate and the decision-making of boxing referees from the standpoint of the coaches, and the research problem lies through the work of the researchers in training and managing the teams. It was noted that the role of the referees is one of the most important roles played by the workers to achieve the objectives of the federation, and that the moral climate that prevails among the administrative body the union and the referees on the one hand and between the referees and coaches on the other hand are among the factors of the success of everyone’s work and the survival and strengthening of confidence in their work and thus the continuity of success and
... Show More