The text has many connotations in the Arabic language, such as vowel points, designation, completion, etc., and the original meaning of the text is to show. The Western text has its owen independent semantic unit .The biblical texts are a mixture of what was reported by the Prophet Moses (peace be upon him) and what the authors described in terms of texts over many centuries.The meaning of the text is guidance and payment, and it is a natural connotation. The religious text for Muslims is divided into peremptory texts that are national proof. The evidence for the meaning of the text is proven by language, and it is not required that the researcher be a jurist. The approach is a factual questionnaire by the researcher according to a specific scientific approach. As for the methodology, it searches for the scientific means that pervade all cognitive processes. One of the mechanisms for understanding the sacred text of Westerners is hermeneutics, which played a fundamental role in understanding religious texts by creating principles and laws for interpretation so that it is logical.
The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere
... Show MoreThe necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show MoreThe aim of the present research is to identify the test wisdom and the engagement with learning and psychological tension among postgraduate students at the University of Samarra according to the variables of the department, gender, age, and whether students are employee or non-employee. The study also attempts to identify the relationship between the test wisdom and the engagement with learning and psychological tension. The research sample consisted of (75) postgraduate students randomly selected from college of Education. The researcher applied the test–wisdom of (Mellman & Ebel) and the scale of engagement with learning preparation by (Al-zaabi 2013). In addition, the researcher used the list of the psychological stress of (Abu
... Show MoreWater produced from power plants is one of the most important sources of water pollution, especially for areas like Baghdad, Contaminated industrial wastewater is a major environmental challenge due to the rapid growth of industries, leading to increased accumulation of harmful pollutants in water resources, the work is intended to study the impact of water generated from a power plant in the south on the level of heavy metals before and after the treatment process and after its discharge to the Tigris River. Objective is to determine the extent of heavy metals such as iron, copper, chromium, and zinc concentration in water extracted from various points and subsequently study the monthly variations of these elements with a view to assessmen
... Show MoreIn his life, a person engages in different types of verbal and actual dispositions that result in various effects, some of which are necessary and not valid, such as selling, and some are not necessary for one of the two contracting parties, such as a mortgage or both, such as lending and agency. However, there are some actions that are sometimes necessary and not necessary at other times, such as a gift that indicates in its simplest sense. Owning money for another without compensation, it is one of the doors of benevolence and benevolence, and it is one of the attributes of perfection with which God, may He be glorified and exalted be He, described Himself. - And if this analogy is the difference - and distanced himself from greed, the
... Show MoreIn the name of of Allah the Merciful
Research Summary
This rule is one of the common rules between the sciences of the principles of jurisprudence and the jurisprudence rules. It is originally a fundamental rule because it relates to one of the topics of the science of the principles of jurisprudence, which is ijtihad. The ruling on reversing his ijtihad is permissible or not (1), and for this reason Ibn Al-Subki titled it in his book Al-Ishbah wa Al-Nazaer by saying: “What invalidates the judge’s judgment and what does not invalidate it.” ([2]).
The importance of this rule comes from the need for it by the judge, the mufti and the imitator, for the judge needs it to know the matters in which the ruling base
... Show MoreLanguage as a means of communication has long been the concern of many conversation analysts in their studies such as: Sacks et al. (1974), Schegloff et al. (1977), Duncan (1972), Grice (1975) and Burton (1980). Burton has attempted analyzing the first ten transitions of the play “The Dumb Waiter” for mere a presentation of her approach. This paper aims at analyzing the conversational structure of forum on the subject of literary fiction and genre fiction by applying Burton’s model (1980) of analysis to answer the question to what extent this model is applicable in analyzing the presented text. The findings of the investigation have proved the applicability of the structure of conversation formulated by Burton (1980) in her model wit
... Show More