Scientists have mastered the codification of the hadeeth and authorship in it, and walked in a variety of courses, including what is known when the late books seal books, which is inclined by Sheikh Sheikh students in the last Council is reading a book of the books of the year or so, and mention a party from the translation of the book owner After that methodology of what he sees important, then speak to the last hadeeth in the book Sindh and Manta, and sometimes market attribution to the author of the book as did Suleiman al-Jamal (God's mercy) deceased in 1204 AH, in this seal on the true Imam Bukhari Which we will investigate and publish. (God willing).
This study examines the syntactic and semantic functions of the conscience of the chapter and the grammatical disagreement in its diagnosis between two famous linguists: Sibuyh and fur. Also, the conscience of the chapter occupies an important synthetic space in the construction of the Arabic sentence, identified by the Arab scientists, as linguistic analysts, have a strong sense of language and careful observation, they revealed it in their linguistic composition through the analysis of nominal structures, and found that it I come in specific syntactic patterns and grammatical templates that have certain characteristics that are unique to them because of the conscience of separation in their compositional space.
Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreThe research deal with three variables of exceptional importance to organization business firms. These variables are emotional intelligence, transformational leadership, and organizational performance. The aim of this research is to determine the effect of emotional intelligence and transformational leadership on organizational performance at the banking sector, which is represented by Al-Rafidain Bank. The problem of the research is expressed by many questions related with the nature of the interrelationships and effects among research’s variables. The researcher has depended upon the descriptions - analytical approach. on a random sample of (80 ) managers
... Show Moreــد ً الوزيرالـــوزيــرمحمد بن علي بن خلف ابو غالب الملقب بـ (فـــخـر الــمـلك )(407هـ-1016م)من الشخصيات المهمة،ية البويهية ، المثيراء الامارواعظم وزرالجدل ، وهذا ما سنوضحهفي البحث .ي كون والده ِ كان صيرفيا ً فلادة ونشأة الوزير فخر الملك في بيئة عنيت بالجانب الأدارأسهمت وٌي ديوان مدينة واسط ، أثرِاتهفي صقل قدرالإالع ِ دارية ، فضلا ً عن صفاتهقلية ،ة البويهية علىاء الأماروالشخصية التي جعلته ُ يكون رمز وزرلكل ةارال
... Show MoreThere is no doubt that the achievement of the manuscripts is important in a place as it is based on reviving the heritage of the Islamic nation, as well as engaging in the prophetic hadith and its sciences pride for every Muslim, and this prompted me to achieve a manuscript message that serves this aspect i.e. the science of the prophetic hadith, and in an important subject that needs to stand on Each of the people, as well as the one who cares about the science of hadith and this topic is: Explaining the hadith of the people is partners in three, to the scholar Muhammad bin Ismail, famous for the Prince Al-Sanani, mentioning his methods and evidence, and their degree of health and weakness, and the statement of what is intended of him,
... Show Moreتُعبّرُ الصُّورةُ الحسَّيةُ في شعرِ ابن دُنَينير الموصليِّ([i]) في بنيتها عن تجربةِ الشاعرِ الوجدانيةِ والذهنيةِ, وأفكارهِ ومشاعرِهِ؛ فيصوغُ بها مَفهومًا جديدًا للواقعِ الماديِّ والمعنويِّ، الذي يتسمُ بالوضوحِ أولاً، وبالقرْبِ من الذهنِ ثانيًا، للربْطِ بين الحواسِّ الإنسانيةِ والمعاني الذهنيةِ، لِتُقَدِّمَ الصُّورةُ الحسيَّةُ إلى ((المتلقي صُورًا مرئيةً، يُعادُ تشكيلُها سياق
... Show MoreThe problem of this research is:
What are the sustainable development goals that received the priority in the press addressing of the newspapers under study?
What are the journalistic arts adopted by these newspapers in addressing the sustainable development goals?
What are the journalistic sources that Arab newspapers depended on when addressing the sustainable development goals?
What are the geographic range the Arab newspapers adopted in addressing the sustainable development goals? The research is categorized into descriptive research, adopting the survey method, and using the content analysis method.
The sample of research was determined by the preparation of the Arabic newspapers (Al-
... Show MoreThe messages are ancient method to exchange information between peoples. It had many ways to send it with some security.
Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.
To send any message text the sender converts message to ASCII c
... Show MoreIn this study; a three-dimensional model was created to simulate groundwater in Al-Haydariyah area of the governorate of Al-Najaf. A solid model was created to utilize the cross sections of 25 boreholes in the research region, and it was made out of two layers: sand and clay. The steady-state calibration was employed in six observation wells to calibrate the model and establish the hydraulic conductivity, which was 17.49 m/d for sand and 1.042 m/d for clay, with a recharge rate of 0.00007 m/day. The wells in the research region were reallocated with a distance of 1500 m between each well, resulting in 140 wells evenly distributed throughout the study area and with a discharge of 5 l/s, and the scenarios were run for 1000
... Show More