The research is the realization of a manuscript of Abdul Baqi al-Omari nicknamed (Farouk) relative to Al-Faruq Omar bin al-Khattab (Radha) and (Mosli) relative to the city of Mosul in Iraq and (immediate) to improvisation of poetry immediately lived during the era of the Ottomans. Entitled (Picture written by the whole secret sea embroidered crown literary style genius with wisdom poetry and magical prose Hazrat Abdul Baqi Effendi Omari comforting and congratulated to Sheikh Ali Talabani dear) and the manuscript in two versions, the subject of my brothers, in which congratulations and condolences Sheikh Ali Talabani, an administrative position in the Ottoman Empire, And the importance of the manuscript Baha The twist on the hair of Abdul Baqi al-Omari is not in his printed office.
When sites of new communication occurs which represents the merit of the development of communication technology which is characterized by the services of ( facebook-twiter-corapora-youtube-mass space-friendster-flicker-willnecked in addition to the direct services for viber-whatsup-telgram-and chat on) play important role in changing the infrastructure of Arabic societies which are consideredas closed and not changeable societies during near period and the significance of this study comes from the importounce of this subject which is considered as anew trend of the age on the field of media and public response and acceptance inspite of what is known about Arabic society-it doesn’t accept change-this occurance is associated with terms
... Show More
Declaration has become today has an important and active and influential role in the recipient public life، and are concentrated advertising on the creativity component manufacture to attract his attention toward what to be announced from a variety products، and is dominated by television commercials tempo and imagination، and display them a variety of ways catches the attention and an impressive simulates the their senses of hearing and sight، to influence in the receiver and the public paid for purchase. Through it crystallization the subject of our research on the importance of creativity in television advertising and effective for attracting the attention of the publi |
Scientists have mastered the codification of the hadeeth and authorship in it, and walked in a variety of courses, including what is known when the late books seal books, which is inclined by Sheikh Sheikh students in the last Council is reading a book of the books of the year or so, and mention a party from the translation of the book owner After that methodology of what he sees important, then speak to the last hadeeth in the book Sindh and Manta, and sometimes market attribution to the author of the book as did Suleiman al-Jamal (God's mercy) deceased in 1204 AH, in this seal on the true Imam Bukhari Which we will investigate and publish. (God willing).
After Hamdallah and his success on the realization of this manuscript (a letter in detail what was said in the parents of the Prophet Ibn Kamal Pasha (d. 940 e) study and investigation I will review some of the results reached in the realization of this manuscript:
1. The hadiths mentioned in this manuscript are mostly placed or weak.
2 - We are not entitled to speak about the silence of the law for saying Almighty ﭽ ﮮ ﮯ ﮰ ﮱ ﯓ ﯔ ﯕ ﯖ ﯗ ﯘ ﯙ ﭼ Table: 101.
3 in which harm to our Holy Prophet وله تع ﮂ ﮃ ﮄ ﮅ ﮆ ﮈ ﮉ ﮊ ﮋ ﮌ ﮍ ﮎ ﭼ parties: 57.
4 Because the parents of the Prophet of the people of the period ordered them to God for the Almighty ﭽ ﯨ ﯩ ﯪ ﯫ ﯬ
The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.
Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.
To send any message text the sender converts message to ASCII c
... Show MoreIn this work, the study of corona domination in graphs is carried over which was initially proposed by G. Mahadevan et al. Let be a simple graph. A dominating set S of a graph is said to be a corona-dominating set if every vertex in is either a pendant vertex or a support vertex. The minimum cardinality among all corona-dominating sets is called the corona-domination number and is denoted by (i.e) . In this work, the exact value of the corona domination number for some specific types of graphs are given. Also, some results on the corona domination number for some classes of graphs are obtained and the method used in this paper is a well-known number theory concept with some modification this method can also be applied to obt
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreThe study aims to identify how to build the media message in an artistic design style (infographic) to reach the mechanism of building the media message by infographic in the researched news sites. For the survey method, which is one of the best methods used to study the subject of the research, the researcher used the method of content analysis, the employee of the research tool, a quantitative and qualitative content analysis form for the study of 74 infographics that appeared during the research period in the research sample sites. The study revealed a number of results, most notably 1. The surveyed sites employed the information in a manner based on images, shapes and data, that is, through the use of the visual element and the
... Show MoreThe aim of this research is to investigation the optimization of the machining parameters (spindle speed, feed rate, depth of cut, diameter of cutter and number of flutes of cutter) of surface roughness for free-form surface of composite material (Aluminum 6061 reinforced boron carbide) by using HSS uncoated flat end mill cutters which are rare use of the free-form surface. Side milling (profile) is the method used in this study by CNC vertical milling machine. The purpose of using ANFIS to obtain the better prediction of surface roughness values and decreased of the error prediction value and get optimum machining parameters by using Taguchi method for the best surface roughness at spindle speed 4500 r.p.m, 920mm/rev feed rate, 0.6mm de
... Show More