Cybercrime and risks to children between the problems and solutions( An analytical study in the light of international, Arab and national statistics).
Lies the problem of the study to identify a new type of crime is different from the same traditional character of the crimes or what was customary since human creation up to the information revolution and we enter the era of globalization, which is also called (cyber crime) and their negative impact on all segments of society, especially children, as they the day of the most important social security threats, for all local and international communities alike , and those risks require collective action to various sectors and segments of society ,especially the educated classes in order t
Variable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required information (the
... Show MoreA disagreement has arisen among scholars regarding the ruling on historical statues and monuments in Muslim countries, especially after the Taliban blew up some huge historical statues, and we have witnessed different positions that reach the point of contradiction, each claiming to be right, and now that the crisis has passed and the intensity of the dispute has subsided, I see It is appropriate to discuss this issue calmly, without drifting behind this or that party, to find out the legal position on these statues and monuments.
I presented the most prominent modern opinions related to the subject and discussed them in this research, which I called (Sharia’s position on historical statues and monuments), in which I tried to reach
Abstract In this work we introduce the concept of approximately regular ring as generalizations of regular ring, and the sense of a Z- approximately regular module as generalizations of Z- regular module. We give many result about this concept.
In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreSpeech is associated with all early term grammar - somewhat - talking about the beginnings of the emergence of grammar, its foundation, and the truth is that this period has remained obscure, what came of them was a novels dealt with a facilitator beginnings as, and this means that what was of grammatical terms in the period of the first generation of grammarians do not constitute in itself, but the initial harbingers of serious way as in the science, and the real beginning of the term grammar mature as orally were at Hebron and Sibawayh evident in the book, then the efforts of the grammarians available until after the term of grammar arrived to what it is .
In this area is (actor) a grammatical terminology, which won at the ancient s
The Moslem women between west and Islam ,This study deals with Muslim women
from the west Pont of view in the oriental studies or the western media and how it was
exposed to ill-treatment or evil-eyed by the west due to misunderstanding or it was done on
purpose that they didn’t comprehend how the women deals with Islam ,so this western view
assured that Islam had disparaged the women's position and hindered her freedom, aiming at
stabbing Islam and dislocate the Islamic tissue which is formed from man and women.
This study has established with evidences the distance of this western view from reality
Islam in fact raised and lifted women's position while the western women was living on
the margin of life, robbed
AA Al-Nuaimy, Iraqi J Comm Med, 2008 - Cited by 3
Energy is one of the components of the national security of countries and is of particular importance to the industrialized countries, including Germany. Energy policy includes many areas and has an impact on various sectors such as the environment, climate, agriculture and others. During the past few years, Germany has witnessed many transformations, the most important of which is the energy transition towards renewable energy, and it was strengthened in the strategy that was It was developed in 2010, which aims to achieve a long-term energy transformation, and sales of the German energy technology sector have evolved from 2010 to 2020, and this issue is related on the other hand to the concept of energy security and because of its strateg
... Show MoreVehicular ad hoc network (VANET) is a distinctive form of Mobile Ad hoc Network (MANET) that has attracted increasing research attention recently. The purpose of this study is to comprehensively investigate the elements constituting a VANET system and to address several challenges that have to be overcome to enable a reliable wireless communications within a vehicular environment. Furthermore, the study undertakes a survey of the taxonomy of existing VANET routing protocols, with particular emphasis on the strengths and limitations of these protocols in order to help solve VANET routing issues. Moreover, as mobile users demand constant network access regardless of their location, this study seeks to evaluate various mobility models for vehi
... Show More