The study aims to introduce the Islamic sites available on the Internet and determine the criteria that contribute to evaluating these sites to indicate their value, topics, and services, while evaluating a simple random sample of the general Islamic sites, which number (35) sites. The results were presented in (8) tables. The study concluded To a set of conclusions, including: (465) “Islamic” websites were seized during the research period, and they are constantly increasing. They were classified according to the name of the website (domain name) com, org, net, edu, and also according to topics such as general Islamic websites and websites of holy places. Mosques, sites of sheikhs, etc. Among the best general Islamic websites are: Isla
... Show MoreLet be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreRemote surveying of unknown bound geometries, such as the mapping of underground water supplies and tunnels, remains a challenging task. The obstacles and absorption in media make the long-distance telecommunication and localization process inefficient due to mobile sensors’ power limitations. This work develops a new short-range sequential localization approach to reduce the required amount of signal transmission power. The developed algorithm is based on a sequential localization process that can utilize a multitude of randomly distributed wireless sensors while only employing several anchors in the process. Time delay elliptic and frequency range techniques are employed in developing the proposed algebraic closed-form solution.
... Show MoreThe ultimate goal of any sale contract is to maximize the combined returns of the parties, knowing that these returns are not realized (in long-term contracts) except in the final stages of the contract. Therefore, this requires the parties to the contract to leave some elements open, including the price, because the adoption of a fixed price and inflexible will not be appropriate to meet their desires when contracting, especially with ignorance of matters beyond their will and may affect the market conditions, and the possibility of modifying the fixed price through The elimination is very limited, especially when the parties to the contract are equally in terms of economic strength. Hence, in order to respond to market uncertainties, the
... Show MoreThe Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MorePlentiful of healthcare practice is based on a disease/treatment approach rather than a prevention one. That is, the predominant focus is on treating existing symptoms and conditions that bring the patient to healthcare setting. There is no doubt about the significance of this approach for acute conditions, but there is some question whether this is the most efficient and effective way of distributing healthcare for increasing number of diseases and limited resources.
The evidences from everywhere have showed the profound cost benefit of prevention in healthcare practice. Healthy community, therefore, is the ultimate aim in any health services planning. The priority of care giver is shifted now to promote health and prevent
... Show MoreThe Gender study is consider one of the concepts which the Postmodernism reached
after the end of Modernism, where the first one has limited the criticism study choices before
the second after closed many doors of subjects which was enriched by researches.
It is pretty clear that the root of this concept belongs to the Linguistics which provided
the Criticism with a countable reasons of it is growth.
The attention in the study of gender in Feminine Literature and Criticism increased in
Arabic studies since the early years of twenty one century, so this research is presented to be
an introduction to this subject which could pave the way to more studies.
In addition to the Gender studies this research deals with ano
Experiments were carried out to investigate natural convection heat transfer in an inclined uniformly heated circular cylinder . The effects of surface heat flux and angle of inclination on the temperature and local Nusselt number variations along the cylinder surface are discussed . The investigation covers heat flux range from 92 W/m² to 487 W/m², and angles of inclination 0° ( horizontal) , 30° , 60° and 90° (vertical) . Results show an increase in the natural convection as heat flux increases and as angle of inclination moves from vertical to horizontal position. An empirical equation of average Nusselt number as a function of Rayliegh number was deduced for each angle of inclination .
For a nonempty subset X of a group G and a positive integer m , the product of X , denoted by Xm ,is the set Xm = That is , Xm is the subset of G formed by considering all possible ordered products of m elements form X. In the symmetric group Sn, the class Cn (n odd positive integer) split into two conjugacy classes in An denoted Cn+ and Cn- . C+ and C- were used for these two parts of Cn. This work we prove that for some odd n ,the class C of 5- cycle in Sn has the property that = An n 7 and C+ has the property that each element of C+ is conjugate to its inverse, the square of each element of it is the element of C-, these results were used to prove that C+ C- = An exceptio
... Show More