Whoever contemplates the Qur'an and recites its texts finds that the Qur'an did not invent or invent words that were unknown before it. Rather, it is the language of the Qur'an which deals with all the matters of the saying. He chose the most honorable of the materials and connected them to the meaning. And in the places of prosperity or sweetness, we find his words easy, to go into the midst of the ills for which it is The Holy Quran chose vocabulary and structures without The son of Ajeeba was one of those distinguished by high taste and linguistic sciences. This ability helped him to analyze and draw, and to explain the ills for which he influenced the singular On the other, and installed on another, and to show the efforts of Ibn Aje
... Show More Chapter One : the importance of research and the need for it .
He has developed the concept of the curriculum has evolved as other educational concepts . Because the world has become a small village due to modern technology and are used in various aspects of life , and the rapid communication between the world can be accessed easily and conveniently . And that the purpose of education citizens who create social functions which ones to keep the culture , upgrade and repair flaws, and aims to develop the capacity of the individual and the preparations in the footsteps of scientific and technological development .
- The goal of research : The research aims to:
1 . What is the
Recently, Knowledge Management Systems (KMS) consider one of the major fields of study in educational institutions, caused by the necessity to identify their knowledge value and success. Hence, based on the updated DeLone and McLean’s Information Systems Success Model (DMISSM), this study set out to assess the success of the Perceived Usefulness of Knowledge Management Systems (PUKMS) in Iraqi universities. To achieve this objective, the quantitative method is selected as the research design. In total, 421 university administration staff members from 13 Iraqi private universities were conducted. This study highlights a number of significant results depending on structural equation modeling which confirms that system, information, and s
... Show MoreEven though in recent decades a bulk of studies have been accomplished on the use of communicative language teaching (CLT) in English as a foreign language (EFL) environments, fairly a limited numbers of studies precisely dealt with investigating the attitudes of language teachers, students and supervisors concerning the principals of CLT in the context of Iraq. Henceforth, this study was designed to delve into the attitudes of teachers, learners and supervisors about the implementation. To this end, the study was accomplished using a mixed method design. The present study was carried out in two phases: designing and using a questionnaire plus interviewing the teachers, students and supervisors (51 language learners, 41 teachers and
... Show MoreIn this work, an analytical approximation solution is presented, as well as a comparison of the Variational Iteration Adomian Decomposition Method (VIADM) and the Modified Sumudu Transform Adomian Decomposition Method (M STADM), both of which are capable of solving nonlinear partial differential equations (NPDEs) such as nonhomogeneous Kertewege-de Vries (kdv) problems and the nonlinear Klein-Gordon. The results demonstrate the solution’s dependability and excellent accuracy.
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
