Praise be to God who created the soul, perfected it, and inspired it with its immorality and piety. He says in His Noble Book: ﭤ Fajr: 27-30 Glory be to You, O God! O Lord, on whom I have chosen for You as a beloved from myself and the soul of the two worlds, may our master Muhammad be sacrificed for him, who enlightened the horizons with his introduction to enlightenment. It soon ends with the end of pleasure, which is the opposite of the pleasure of thought and meaning, as it is permanent and continuous, and from here we see that the Messenger of God, may God’s prayers and peace be upon him, urges us in various places to seek knowledge and fortify the soul and thought in a way that raises one’s status and protects him from the struggle of evil in this world and the Hereafter, where he said, may God’s prayers and peace be upon him : (Whoever travels a path seeking knowledge, Allah will make a path easy for him to Paradise, and the angels lower their wings in approval (narrators of the omnipotent). And we are in the midst of this relentless campaign against the ideas of our late nation, behind which it is intended to obliterate the correct intellectual truth and replace it with atheistic ideas or ideas that lead us to diminish the greatness of Islam, its creed and its law, we find it necessary for us to enlighten and understand well our Islamic heritage and what our previous scholars left of the civilizational and sober intellectual legacy Especially in the field of fighting philosophers, atheists, and those with narrow ideas, through the extensive and detailed study of those important manuscripts that are found in the shelves of international libraries. Ibn Abd al-Rashid al-Khawji, may God have mercy on him, a wide mercy, as he explained in it the book Ma’alim Usul al-Din by Imam Fakhr al-Islam Muhammad ibn Umar al-Razi, upon him be the clouds of mercy and pleasure. And it is called the speaking souls. May God make us among those who speak the truth in this world and the Hereafter. He is the best protector, and the best supporter to him is our fear in the few and the many, and may God's prayers and peace be upon the pearl of the coincidence of existence and the owner of the praised place, our master and our lord Muhammad and his good family and his faithful companions.
Protecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show MorePhotodetector based on Rutile and Anatase TiO2 nanostructures/n-Si Heterojunction
Pemphigus vulgaris is an autoimmune disease of the skin and mucous membrane. Renal transplantation is a common procedure in
To study the frequency of skin tumors and infections in patients with pemphigus vulgaris compared with renal transplant recipients and normal controls.
One hundred kidney transplant recipients, their ages ranged from 14 to 70 (46.65 ± 4.74) years
Background: Women with previous two or
more caesarean deliveries are usually
managed by elective cesarean section to avoid
the possible risks of labor.
Objective: To compare the relative risks of
maternal and fetal outcomes in emergency
versus elective previous two or more
caesarean deliveries
Design: Randomized prospective clinical
study
Setting: Al-Elweya Maternity Teaching
Hospital, from 1st of March to 31st of
September 2008.
Methods: The study groups, those who had
previous two or more caesarean deliveries,
were included from the hospital admissions.
The 1st group (102 women) presented in labor
and was managed by caesarean delivery as
soon as it was possible. The second group (7
To improve the efficiency of a processor in recent multiprocessor systems to deal with data, cache memories are used to access data instead of main memory which reduces the latency of delay time. In such systems, when installing different caches in different processors in shared memory architecture, the difficulties appear when there is a need to maintain consistency between the cache memories of different processors. So, cache coherency protocol is very important in such kinds of system. MSI, MESI, MOSI, MOESI, etc. are the famous protocols to solve cache coherency problem. We have proposed in this research integrating two states of MESI's cache coherence protocol which are Exclusive and Modified, which responds to a request from reading
... Show Morelevel of effectiveness of Glutathione - S - Transferees (GST), Glutathione peroxides (GPX),Malondialdehyde (MDA) the product of lipid peroxidation and some trace elements ( zinc,seleinum,iron ,copper ) had been measured in sera of (50) women with breast disease.which had been divided to : Control group (25),The first group (A) benign breast tumors (25),the second group (B) breast cancer (25). The results showed a clear moral high level of Glutathione - S - Transferees (GST), Glutathione peroxidase (GPX) , and Malondialdehyde (MDA) level in breast cancer group while a slight increase were observed in the levels of these enzymes and(MDA) in benign breast group. A significant reduction was evident in the levels of selenium and zinc
... Show MoreThe Bangestan reservoir, which occurs in the Ahwaz oilfield, consists of the middle Cretaceous limestone Ilam and Sarvak Formations that were deposited in the Zagros Basin. The reservoir is divided into ten Zones (A to J) formed in the upper Albian-Santonian and contains considerable hydrocarbon accumulations. The limestones were deposited on an extensive shallow carbonate platform on a passive margin and are dominated by rudist biostrome and grainstone facies. Paleogeographical changes mean that identification of the facies is complex. Seismic stratigraphy and isotopic data are used to better understand the structural and geological setting and develop an understanding of the sedimentary environment. The results show that the rudist biostr
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show More