God created man with a social nature, that is, man cannot live alone, but there must be a society associated with him. And when God addressed Adam, the first of His creation, he addressed him with the speech of the Muthanna to him and his wife. “This tree, then you will be among the wrongdoers” (Al-Baqara: 35), and thus was the divine discourse for the first human experience on earth. It accommodates a social relationship, which is (the family), husband and wife. And since a person needs to meet, as Ibn Khaldun said: (The human meeting is necessary, and the wise men express this by saying (the human being is of course civil)) (). And as it is known that with the meeting, relations arise from love and hate, cooperation and struggle, and thus the social reality of the human society arises
This paper is concerned with introducing and studying the first new approximation operators using mixed degree system and second new approximation operators using mixed degree system which are the core concept in this paper. In addition, the approximations of graphs using the operators first lower and first upper are accurate then the approximations obtained by using the operators second lower and second upper sincefirst accuracy less then second accuracy. For this reason, we study in detail the properties of second lower and second upper in this paper. Furthermore, we summarize the results for the properties of approximation operators second lower and second upper when the graph G is arbitrary, serial 1, serial 2, reflexive, symmetric, tra
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreIn this work, two cone-inverted cylindrical and cross-hybrid dielectric resonator antennas are stacked and excited by the coaxial probe method with an operating standard resonant frequency of 5.438 GHz. A drawback of these standard Dielectric Resonator Antennas (DRAs) is their narrow bandwidth. For good antenna performance, a stacked DR geometry and a thick dielectric substrate having a low dielectric constant are desired since this provides large bandwidth, better radiation power, reduces conductor loss and nonappearance of surface waves. Many approaches, such as changing the shape of the dielectric resonator, have been used to enhance bandwidth. Using DRA, having the lowest dielectric constant, increases the bandwidth and the electroma
... Show MoreConsidering the magnitude of its economic, social and political impact, unemployment represents a crucial challenge confronting the majority of the countries of the world. The problem of the study was the high rates of unemployment in Sudan and the inability of economic growth rates to keep pace with the steady increases in unemployment rates during the study period. This study aimed to identify the economic and social variables influencing unemployment rate in Sudan, in addition to measuring the impact of these variables over the period (1981-2015). Data were collected from databases of the World Bank and Atlas of the World's data .The study hypothesized the presence of statistically significant and direct relationship between u
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreThe comparison of double informative priors which are assumed for the reliability function of Pareto type I distribution. To estimate the reliability function of Pareto type I distribution by using Bayes estimation, will be used two different kind of information in the Bayes estimation; two different priors have been selected for the parameter of Pareto type I distribution . Assuming distribution of three double prior’s chi- gamma squared distribution, gamma - erlang distribution, and erlang- exponential distribution as double priors. The results of the derivaties of these estimators under the squared error loss function with two different double priors. Using the simulation technique, to compare the performance for
... Show MoreIn this paper, we introduce and study a new concept named couniform modules, which is a dual notion of uniform modules, where an R-module M is said to be couniform if every proper submodule N of M is either zero or there exists a proper submodule N1 of N such that is small submodule of Also many relationships are given between this class of modules and other related classes of modules. Finally, we consider the hereditary property between R-module M and R-module R in case M is couniform.
One technique used to prepare nanoparticles material is Pulsed Laser Ablation in Liquid (PLAL), Silver Oxide nanoparticles (AgO) were prepared by using this technique, where silver target was submerged in ultra-pure water (UPW) at room temperature after that Nd:Yag laser which characteristics by 1064 nm wavelength, Q-switched, and 6ns pulse duration was used to irradiated silver target. This preparation method was used to study the effects of laser irradiation on Nanoparticles synthesized by used varying laser pulse energy 1000 mJ, 500 mJ, and 100 mJ, with 500 pulses each time on the particle size. Nanoparticles are characterized using XRD, SEM, AFM, and UV-Visible spectroscopy. All the structural peaks determined by the XRD
... Show Moreان السبب الرئيسي لاختيار الموضوع كونه من الاساليب الادارية الحديثة التي تهدف الى انجاح المنظمة او الشركة المبحوثة, اذ تمثلت مشكلة البحث في ما دور الادارة بالرؤية المشتركة في تعزيز التسويق الابداعي بالشركة المبحوثة, يهدف البحث الى تسليط الضوء على مفهوم الادارة بالرؤية المشتركة وانعكاساتها على التسويق الابداعي للمنظمة ، باعتبارها منهج اداري حديث يسهم في تغيير وتجديد وتطوير واقع المنظمة المبحوثة( الشرك
... Show More