God created man with a social nature, that is, man cannot live alone, but there must be a society associated with him. And when God addressed Adam, the first of His creation, he addressed him with the speech of the Muthanna to him and his wife. “This tree, then you will be among the wrongdoers” (Al-Baqara: 35), and thus was the divine discourse for the first human experience on earth. It accommodates a social relationship, which is (the family), husband and wife. And since a person needs to meet, as Ibn Khaldun said: (The human meeting is necessary, and the wise men express this by saying (the human being is of course civil)) (). And as it is known that with the meeting, relations arise from love and hate, cooperation and struggle, and thus the social reality of the human society arises
The reasons for the totality are varied and multiple, some of which are attributed to the methods of the Arabic language as the participant
Verbal and omnipotent differences in the oud of conscience, which are comprehensive reasons for language in all
And some of these reasons are due to the sciences of the Qur'an, such as cessation and initiation
The explanation of the explanation for the multiplicity of words and differences in them, which necessarily led to a dispute jurisprudence
Linked to the origin of disagreement in the interpretation of the totality and its orientation and understanding and to summarize this subject and diverge
Parts and vocabulary did not receive the necessary care and did not absorb the lesson an
Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of select
... Show MoreThe Ayyub era witnessed a popular for science, knowledge and became the Ayyub state in its various regions a scientific beacon، despite their preoccupation with wars with the Crusaders now that did not discourage them from their care for science and scientists، and this scientific renaissance had many factors، foremost of which are the tendencies of the sultans and Ayyub kings to pay attention to science and its care، through their establishment of the role of science
اثر التواجد العسكري الامريكي على النظام السياسي في العراق
Among the different passive techniques heat pipe heat exchanger (HPHE) seems to be the most effective one for energy saving in heating ventilation and air conditioning system (HVAC). The applications for nanofluids with high conductivity are favorable to increase the thermal performance in HPHE. Even though the nanofluid has the higher heat conduction coefficient that dispels more heat theoretically but the higher concentration will make clustering .Clustering is a problem that must be solved before nanofluids can be considered for long-term practical uses. Results showed that the maximum value of relative power is 0.13 mW at nanofluid compared with other concentrations due to the low density of nanofluid at this concentration. For highe
... Show Moreيستهدف البحث الحالي التعرف إلى 1 .بناء مقياس سمات الشخصية المفضلة لدى معلمي ومعلمات التربية الخاصة في العراق من وجهة نظر ذوي اإلختصاص والعاملين في هذا المجال. 2 .مستوى توافر سمات الشخصية المفضلة لدى معلمي ومعلمات التربية الخاصة في العراق من وجهة نظر ذوي اإلختصاص والعاملين في هذا المجال. 3 .داللة الفروق اإلحصائية في سمات الشخصية المفضلة لدى معلمي ومعلمات التربية الخاصة ً في الع ارق من وجهة نظر ذوي اإلختصاص والعا
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreThe Negro minority in the United States is associated with social injustice,
political deprivation, and economic oppresion. Its members felt that they are
second-class citizens, and that the acceptance of such status will lead to the
continual oppresion of the Whites upon them. As a result, the educated community
adopted a process to put a framework to their opposition to the former's injustice.
This organised framework is exemplified in the "Niagara Movement," which is
regarded as the first national organisation for Negros. The topic of this study is
chosen due to its historical and political significance.
The study consists of an introduction and five sections. The first section
addresses the preliminaries an