The research deals with the issues related to the fixed names of God U, which are from a set of issues mentioned in the Book of Observations of the Keys Explaining the Mishkat al-Masbah by Abu Al-Hasan Al-Mubarakfory (d. 141 AH). It included five demands: the first of them is in proving and identifying the most beautiful names and divisions of God, and the second in the name, name and name. And the third: It was in their number, while the fourth: in deriving the names, is it suspensive or not? And Fifth: The Compilation of Allah’s Most Beautiful Names.
The )Resalat Al-Gofran) which means to Abi Ala Al-Ma'arri is included in the studies of prose in Arabic literature. The study of the "Message of Forgiveness" was passed in two stages. The first is the traditional linguistic study, specifically the rhetorical one. The second study, which took place in the sixties of the last century, was conducted in the light of comparative literary studies, after Dr. Taha Hussein summarized this letter and rid it of its complex language and after Dr. Bent Shati achieved it. Dr. Lewis Awad relied on her study in the light of comparative studies, Which appeared in Europe in the modern era and was able to discover similarities between them and the old texts that dealt with the subject of "literature of the
... Show MoreThere are many researches deals with constructing an efficient solutions for real problem having Multi - objective confronted with each others. In this paper we construct a decision for Multi – objectives based on building a mathematical model formulating a unique objective function by combining the confronted objectives functions. Also we are presented some theories concerning this problem. Areal application problem has been presented to show the efficiency of the performance of our model and the method. Finally we obtained some results by randomly generating some problems.
There are many questions that have been presented and asked in order to know who the Lady Sharifa bint Al-Imam (peace be upon her) is? And then adopting the opinions that confirm or deny the existence of Mrs. Sharifa or the place of her death, and how did it happen? As well as the question, where is the shrine of Sharifa, daughter of Imam Hassan? Who are the daughters of Imam Hassan? Did she have a grave previously, and when was the trace of this tomb known
Quran is a basic reference of production it is as a source to all sciences, Ayat of Quran would mention the importance of benefits of animals. Quran contain full surrat named in animal names as Al-Baqara that is to clarify its benefits and importance in human’s life.
Quran is a basic reference of production it is as a source to all sciences, Ayat of Quran would mention the importance of benefits of animals. Quran contain full surrat named in animal names as Al-Baqara that is to clarify its benefits and importance in human’s life.
Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8
The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreWisdom is the separation and distinction between aim in the word and work and the lack thereof in accordance with the knowledge surrounding the arts of science, which reached a thorough understanding of things and put them in the quorum. In this research, I have tried to discern the characteristics of the wisdom of Imam Hassan al-Askari (peace be upon him) and to explain his methods and actions which are indicative of the various facets of wisdom required by the nature of the actions and behavior that he has to deal with. Or future mother.
The second topic was devoted to the style of Imam (p) and his wisdom in the situations that necessitated the diversity of methods of dealing such as the method of concealment and the method of refer