Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreSummary
Praise be to God, Lord of the Worlds, and prayers and peace be upon the Master of the Messengers, Muhammad, and upon all his family and companions.
The circle of taboos in the Jewish Sharia is wider than other laws, as the Jews have severe and very complicated rituals in the matter of food, which may not be found among other people of other religions, as the dietary laws that specify foods and drinks forbidden in the Jewish Sharia include very diverse topics. The Torah specified all these laws with several texts
The study showed that Imam Said bin Jubair narrated in the transcriber and copied, which took most of the ink of the nation Ibn Abbas (may Allah be pleased with them), which amounted to fourteen novels.
The study also pointed out that the science of transcriber and copied is from the science of the Koran, which can only prove by the novel and the correct transmission of the Prophet Muhammad .
The study also showed that Imam Saeed bin Jubair, who says that it is permissible to copy in the Koran, contrary to what some scholars said that it is not permissible to copy.
The study also pointed to the possibility of copying and that the highest copies of the Koran Koran.
God saw his servants with truth and light, and made him easy for them, and he commanded those who help them, including a counselor, guide and preacher, so if a Muslim sees deficiencies or defects, he must help him to reform and refine it. That it was in the hands of the prophets, God Almighty created the human being together straight, then melted on those scholars and researchers in all religions on psychological counseling and religious sychotherapy, stressing the importance of religious values in the process of understanding man in the process of psychotherapy and in controlling human behavior. A lot of research and studies have been published. I dealt with the religious approach in the process of treating mental disorders and the aim of
... Show MoreThe results of the historical review of social and political realities in general show that the practical and procedural applications of social engineering as a particular activity primarily of the social and political characteristics of man and society emerged in modern Western societies before appearing in other societies, These results also show that the emergence of these practical reasons and their applications in the West has also seen the emergence of modern theoretical foundations there, which seems to be the usual and usual context everywhere and in most or not all areas of life. Since the social and political dimensions are intertwined in human life and are in full, comprehensive and lasting harmony, interest in this geometry h
... Show MoreThe research aims to how to deal with certain situation to ensure the continuous competitive excellence of business market under the situation of covid-19, especially how to deal with major challenges, identifying the capabilities of tourism industry, investigating the ability of tourism agencies to resist the dynamic change of both internal as well as external environment to ensure their sustainability.
The important here as the paper notice, is how to be efficient and trying to find solutions in order to grow and survive through choosing certain strategies that aligned the critical issues.
Thus to achieve this level, many scenarios planed that could adopt in case of such pande
... Show MoreThe reaction paths of the C-C and C-H bond cleavage in the anthracene and phenanthrene aromatic molecules are studied by applying the ab-initio DFT method. It is found that the C-C bond cleavage proceeds via a singlet aromatic transition state, compelled through a disrotatoric ring opening reaction. A suprafacial H atom shift follows the transition state, leading to the formation of a methylene -CH2 and an acetylenic or allenic moiety. The calculated activation energies for anthracene range from 158.81-208.90 kcal/mol and the reaction energies from 96.106-156.976 kcal/mol. For phenanthrene, the energy values are 157.39-202.34 kcal/mol and 62.639-182.423 kcal/mol, respectively. For the C-H cleavage reactions, the calculated reaction energies
... Show More