The study of these selected traces shows that what Imam Mardini did on Imam al-Zayla'i and enabled him to graduate the hadiths of the book (guidance and conclusions) as well as in choosing the novel closest to Murad the work and not as described by al-Zayla'i .... never deserves descriptions.
Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding
... Show MoreFinancial crisis is one of the topics that have attracted the interest of researchers in recently. The research focused on the issue of the crisis of the Asian Tigers and the mortgage crisis and comparing them in terms of causes and repercussions. It may meet most of the financial crises in many of its causes, factors, roots and results in the advanced and the developing countries. This crisis has its own pattern and its causes and nature and it is characterized by a crisis of cash liquidity and the collapse of many banks and declare bankruptcy and a sharp decline in stock prices and indices of the stock market and so far the common denominators among the causes but does not mean this There are differences between the financial c
... Show MoreThe political participation of the Iraqi woman, gains a big importance equivalent to its role in all other fields. Therefore , it represents a higher value in the democratic orientation in addition to the importance of rising the reality of the woman specifically in the fields that are considered as a scale of the human development like the income, health, and education . The weakness of womenʹs political participation, is something that can't be ignored or neglected if we are looking forward to the rising of the country᾽s reality and achieving the required development in its all aspects. The woman is half of society or more than that due to the burden of raising the generations tasks. This can be achieved by taking part in th
... Show MoreLinguistic research according to modern curricula:
It is one of the important matters that occupy the ideas of those concerned with linguistic studies, whether Arabic or otherwise. Recent years have witnessed the advancement of this methodological approach, and books and studies in Arabic have been written on important, multifaceted issues, of grammatical and linguistic origins, and their balance with new developments and ideas attracted mostly from Western studies.
The comparative approach - as they call it - is one of the modern approaches that is based on balancing a language with other sisters belonging to its family, to reach similarities and differences between them, and to know the c
This research include building mathematical models for aggregating planning and shorting planning by using integer programming technique for planning master production scheduling in order to control on the operating production for manufacturing companies to achieve their objectives of increasing the efficiency of utilizing resources and reduce storage and improving customers service through deliver in the actual dates and reducing delays.
This research study focuses on fundamental questions. It deals with the content of the critical reviews through which the most important sources that undermine the renaissance of the Islamic human society can be concluded. It is the vague fetishization of the sacred between religion, politics, and ideas, which members of society live in and which raised the dust of closed-minded fanaticism that led to the return of deviant extremism. It is oppression, violence, and domination, all of which are professional tools in the manufacture of the ideology of extremism in all its forms. Here, the idea matured in giving a human, intellectual and philosophical overview that mixed the required drawing in the formulation of scientific cont
... Show MoreThe major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech
... Show MorePraise be to the one who taught the pen. Without the pen, the knowledge of the first two would not have reached the others. Then, praise the one who taught man from the printing industry unless he knew, and prayers and peace be upon those who guide all nations to the invention and the follower in the matter of religion, and to his family and companions.
The use of Qur’anic use is an integrated and important topic that examines the building and the meaning, which are two major titles in the study of Arabic, so the goal of scholars when going into these explanations was to find out the wonderful linguistic miracle of this great book.
Scholars have worked hard to talk
The arrival of Russian President Vladimir Putin to power in the Russian Federation is an important factor in delineating a new approach to Russian policy towards regions that have great strategic importance affecting its national security. Therefore, NATO's progress eastward towards these regions prompts Russia to delineate a new strategy to confront this progress as well as preserving its control in the near neighboring regions represented by the countries of Eastern Europe, especially after the changes that occurred in those regions following the color revolutions that swept the region, such as the first application of this Russian policy in 2014, through the annexation of Crimea, and the latest military operations in Ukraine i
... Show More