Preferred Language
Articles
/
jperc-514
Keeping the Secret When Spouses
...Show More Authors

    Keeping the secret itself of topics for values ​​are positive attribute of personality traits balanced. Objective of this research study of  Keeping the secret when spouses, the study of the theory based on the research and literature that dealt with the subject study is important to mention that there was no study of one Iraqi addressed the study of  Keeping the secret when spouses.

The researcher found the importance of the study of it's Keeping the secret when spouses. the factors that affect family relationships in terms of the stability of the marital relationship and this is reflected positively on the lives of family and community.

  Of the recommendations of the research, the adoption of the educational aspect about  Keeping the secret when spouses to keep the family entity, which is reflected in the community Asagrar.

The researcher suggests further studies on the topic of  Keeping the secret when spouses and its relationship with other variables such as life satisfaction, marital sexuality. 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 30 2012
Journal Name
College Of Islamic Sciences
Poetic necessity, when Maari
...Show More Authors

Praise be to God, Lord of the worlds, and prayers and peace be upon the master of the messengers, his family and all his companions. And after:
      This research talks about a topic that has taken a great deal of attention and controversy among many Arabic language scholars, which is the subject of poetic necessity, but it does not talk about the necessity in general, but one of the scholars and writers who had stances and references to this issue was chosen in many places from their books. Abu Al-Ala 'Al-Maari was among the scholars who dealt with this issue on numerous occasions and occasions, and this was evident in his books.

    We chose this topic to see how Abu Al-Ala

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Modernity when Zaki Almelad
...Show More Authors

The Islamic thought still suffers from the problems posed by Western thought in the modern era, especially after the establishment of the modern Arab state, and replacing the intellectual reference that prevailed at that time, which is represented by Islamic thought with another intellectual reference represented by Western thought. Since then, thinkers and innovators and reformers and intellectuals of the Islamists, Are trying to get out of these many problems and multiple, after imposing the nature of that thought and those references with all their consequences, and one of these problems that is still Islamic thought suffers, the bilateral problem that some academics have raisedThe title of the symposium failed The Islamic thought and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 02 2017
Journal Name
Journal Of Educational And Psychological Researches
Impact beyond the knowledge when students of the Faculty of education in teaching methods
...Show More Authors

Research aims to know the impact beyond the defined in the collection. The research community is the second school students at Baghdad University and a research sample (63) students, the number of experimental group (27) students and a control group (30) students.  The researcher was rewarded in variable lifetime for students and educational attainment and educational level of the parents and the educational level of mothers. The researcher has developed a test took the number of paragraphs (20).  A test was true after it has been submitted to the Group of arbitrators. The test was consistent with test method used and the reliability coefficient (0, 88). Either the statistical methods used by the researcher are: Pearson correla

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 12 2022
Journal Name
College Of Islamic Sciences
Keeping abreast of the provisions of Islamic Sharia with the contemporary reality and its developments
...Show More Authors

In The Name Of God the Most Gracious, the Most Merciful [Should he not know he that created? And he is the one that understands the finest mysteries (and) is well-acquainted] surah Al-Mulk verse No. (14), this Qur’anic verse is one of the pieces of evidence that indicates the suitability of Sharia for the human life, since God Almighty created the creation and he is the best-known concerning the needs of his creation to survive and for life to continue.

One of the key ways for the continuity of human life is Sharia's possession of the feature of suitability for every time and place, and for the whole world, and it is comprehensive to all the details of life and its integrated systems, a systems that comp

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Iraqi Journal Of Physics
Studying Audio Capacity as Carrier of Secret Images in Steganographic System
...Show More Authors

Steganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other.  In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Wed May 01 2024
Journal Name
Journal Of Orthodontic Science
Keeping the teeth in line: Exploring the necessity of bonded retainers in orthodontics: A narrative review
...Show More Authors

In most recent studies, long-term retention after orthodontic treatment has been hypothesized that may be necessary to maintain the stability of the dentition and avoid post-treatment changes. The bonded fixed retainer is characterized by its clinical effectiveness, patient acceptance, and lack of patient complaints as compared with a removable retainer. An electronic database (such as PubMed, PubMed Central, Web of Science, Science Direct, Cochrane Library, Scopus, and ResearchGate) has been collected using specific keywords. Of the 152 articles, only randomized clinical trials that investigated different types of fixed retainers or compared fixed with removable retainers were illustrated in tables and included in this review. The

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Apr 20 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Text image secret sharing with hiding based on color feature
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
The concept of sohba when the Golden Imam Through his books
...Show More Authors

Scientists were interested in the statement of the concept of companions and the definition of the companion in terms of his status or his novel or inherent to the Prophet of Allah (peace be upon him) and was for those who did not walk in the translations and the abundant share in this work, and among these scientists Hafiz Shams al-Din al-Dhahabi, which was translated to the companions His books, indicating their status and effort, and who had a novel of them - what we will see in the folds of the research, God willing -

View Publication Preview PDF