In the name of of Allah the Merciful
Praise be to Allah, Lord of the Worlds, and prayers and peace be upon the Seal of the Prophets and Messengers. The envoy is a mercy to the worlds Muhammad Sadiq Al - Amin, and to the pure and good companions of the Tayyibites.
The formula of the morphological formulas, which have diverged from other meanings, whether lexicon or contextual and what this formula contains many meanings (effective source) and (effective in the sense of effective) and (effective sense reactor) and (effective sense) and ( (F) in the sense of a similar character) and ((the name of the) (collect). This was dealt with in the formula in Surat al-Nisaa a gramophone study. As mentioned in the study of the morphological subj
Rare earth elements (Cerium, Lanthanum and Neodymium) doped CdS thin films are prepared using the chemical Spray Pyrolysis Method with temperature 200 oC. The X-ray diffraction (XRD) analysis refers that pure CdS and CdS:Ce, CdS:La and CdS:Nd thin films showed the hexagonal crystalline phase. The crystallite size determined by the Debye-Scherrer equation and the range was (35.8– 23.76 nm), and it was confirmed by field emission scanning electron microscopy (FE-SEM). The pure and doped CdS shows a direct band gap (2.57 to 2.72 eV), which was obtained by transmittance. The room-temperature photoluminescence of pure and doped CdS shows large peak at 431 nm, and two small peaks at (530 and 610 nm). The Current – voltage measurement in da
... Show MoreAfter looking at the books of the first two grammarians, may God have mercy on them and reward them for what they have provided us with the rules of service to the Book of God and service to Arabic, we must highlight some of the things that the grammarians wanted to clarify, which did not come out of what they proved, but we are working on the statement of the issuance of the passport Provisions from the syntactic industry, and whether it is intended to prove a rule is not very added to the statement of speech, and we know that language, any language was the function of understanding; therefore they said: (speech is a useful word that indicates the benefit improves silence on them), and this concept between Grammatical controls and conte
... Show MoreThe study aims to identify the effectiveness of a structural theory-based training program in enhancing the teaching practices of Arabic language teachers teaching grade ten in South Al Batinah in Sultanate of Oman. The study used the quasi-experimental design, and the sample consisted of 40 male and female teachers. To achieve the objectives of the study, a training program, an observation form and a measurement tool of teachers’ tendencies towards a structural teaching were made. The program was implemented with an experimental group of 20 female and male teachers in the first semester of the academic year 2018/2019. The study has found that there is a statistically significant difference between the average grades before and after i
... Show MoreThis paper presents the effect of Cr doping on the optical and structural properties of TiO2 films synthesized by sol-gel and deposited by the dip- coating technique. The characteristics of pure and Cr-doped TiO2 were studied by absorption and X-ray diffraction measurement. The spectrum of UV absorption of TiO2 chromium concentrations indicates a red shift; therefore, the energy gap decreases with increased doping. The minimum value of energy gap (2.5 eV) is found at concentration of 4 %. XRD measurements show that the anatase phase is shown for all thin films. Surface morphology measurement by atomic force microscope (AFM) showed that the roughness of thin films decrease with doping and has a minimum value with 4 wt % doping ratio.
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreSM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show More