The research paper talks about one of the topics that deals with one of the high-style styles in the Holy Qur’an that carries with it a high and influential style in directing the Qur’anic context, as the verses are singled out with certain words, each of which came out to other meanings, which is what was called in the past “what the wording agreed and the meaning differed Or the so-called “faces and analogues” and the meaning of analogues in the language and the Qur’an; To mention a word in a place and it means a meaning other than the other, and to interpret each word with a meaning other than the other meant by the faces, and accordingly the goal of the research is in the linguistic significance, in order to reveal the truth of the meaning, and to know the linguistic laws that link the parts of the same meaning, and the Holy Qur’an has its linguistic characteristics Whether it is in the singular or in the construction of the sentence, wherever the word is mentioned, its semantic dimensions are carefully taken into account, and this is part of its miraculousness. After doctrinal studies occupied a significant space in Islamic thought 0
The costume is a language that has carved itself into a path that is transformed over time in line with the development of human thought. The child theater is a form of communication between the individual and his society. The costume in the child's theater is seen as a sign of personality and identity. It is a model of communication that uses many of the world systems to which it belongs. Directed to the child by invoking the creative and creative energies of the designer in the formation of the children's theater. The second topic was the communicative function of secondary signs of uniforms and patterns of their transformations. The theoretical framework of the indicators included the on the research community. And his tools in the an
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreThe bandwidth requirements of telecommunication network users increased rapidly during the last decades. Optical access technologies must provide the bandwidth demand for each user. The passive optical access networks (PONs) support a maximum data rate of 100 Gbps by using the Orthogonal Frequency Division Multiplexing (OFDM) technique in the optical access network. In this paper, the optical broadband access networks with many techniques from Time Division Multiplexing Passive Optical Networks (TDM PON) to Orthogonal Frequency Division Multiplex Passive Optical Networks (OFDM PON) are presented. The architectures, advantages, disadvantages, and main parameters of these optical access networks are discussed and reported which have many ad
... Show MoreThis study aims to focus on the Motives behind volunteer work among a sample of volunteers working in civil society organizations and check if there are statistical differences with those variables according to (gender, age, job, period of volunteer work, and residence. The sample consists of (220 )volunteers,(189) male and(31) female from southern, northern and central governorate .The Volunteer Functions Inventory(VFI)(Clary & et al,1989)was applied, It consisting of(30) items with six fields( Values, Understanding, Social motives, Career, Protective, Enhancement).
The results show that the most common and important motivations are (Values, Understanding, and social motivations), there are differenc
... Show MoreThe major objective of this study is to establish a network of Ground Control Points-GCPs which can use it as a reference for any engineering project. Total Station (type: Nikon Nivo 5.C), Optical Level and Garmin Navigator GPS were used to perform traversing. Traversing measurement was achieved by using nine points covered the selected area irregularly. Near Civil Engineering Department at Baghdad University Al-jadiriya, an attempt has been made to assess the accuracy of GPS by comparing the data obtained from the Total Station. The average error of this method is 3.326 m with the highest coefficient of determination (R2) is 0.077 m observed in Northing. While in
OpenStreetMap (OSM), recognised for its current and readily accessible spatial database, frequently serves regions lacking precise data at the necessary granularity. Global collaboration among OSM contributors presents challenges to data quality and uniformity, exacerbated by the sheer volume of input and indistinct data annotation protocols. This study presents a methodological improvement in the spatial accuracy of OSM datasets centred over Baghdad, Iraq, utilising data derived from OSM services and satellite imagery. An analytical focus was placed on two geometric correction methods: a two-dimensional polynomial affine transformation and a two-dimensional polynomial conformal transformation. The former involves twelve coefficients for ad
... Show MoreDavid Hare (b.1947) is one of the most critically acclaimed, contemporary British dramatists. A playwright, director and filmmaker, he has written more than thirty plays for the stage and seven original screen plays for cinema and TV (Susan Emerling, p.1). He began his dramatic career in the late sixties. Along with such dramatists as Howard Brenton and Trevor Griffiths, he writes in the aftermath of the "Angry Young Men" tradition of John Osborne. It is a well-known fact that the element of anger continued in the drama of the 1960s and became even more radicalized after the social, cultural and political unrests of 1968 by the dramatists of the "second wave" to whom Hare belongs (John Russell Taylor, p.14). Setting his plays in a variet
... Show MoreThe aim of the current research is to construct a scale of emotional adjustment for kindergarten children and to set a standard for its evaluation. To achieve this, a scale consisting of (19) items was prepared. The mother of the child answered by adopting the method of self-report, which is expressed in the form of reporting terms, as each item represents a situation in the child's life and each situation has three alternatives to answer that represent various responses to the mentioned situation. One of the alternatives represents the emotionally adaptive response, which is given a degree (3), the second response expresses the emotional adjustment partly that took the degree of (2), and the third response expresses the weakness of emot
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show More