The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.
The Logic of Freezers and Animals in the Holy Quran
The current research aims to determine the intellectual security and the psychological resilience of Secondary school students and how these two variables are related to each other. The study also seeks the extent to which psychological resilience contributes to intellectual security
The research sample consisted of (420) students from the Secondary stage in the Directorate of Education of Baghdad / Rusafa III. Two scales were administered to the participants to collect the needed data. As for the analysis of data, Pearson correlation coefficient, T-test, and the Regression analysis were employed, the results revealed:
- The members of the sample have an intellectual Security.
- The members of the sample have
The article considers a creolized text as a means of modern communication, describing its key verbal and visual components; the relationship of concepts polycode and creolized text has been shown; the universal basic image features have been called; the following kinds of creolized texts have been distinguished; it has been proved that the effective means of attracting the attention of the addressee is the use of expressive font features, which are divided into two groups: topographics (mechanisms of varying of areal syntagmatic of a text) and supragraphcs (change of typeface of font).
Background: Surface treatment of machined dental zirconia for enhancement of the adhesion to resin cement, using Er,Cr:YSGG Laser. Materials and Methods: Total number of 42 zirconia disc specimens (9 mm diameter, and 2 mm height) was sintered according to the manufacturer instruction. They are divided into six groups, each group of seven samples. Laser groups (Experiment parameters) were depend on laser total irradiation time, pulse duration, and power. Group (A): 20 sec., 60 µs pulse duration. Group (B): 30 sec., 60 µs pulse duration. Group (C): 40 sec., 60 µs pulse duration. Group (D): 20 sec., 700 µs pulse duration. Group (E): 30 sec., 700 µs pulse duration, with different powers used (1, 1
... Show MoreAbstract
The current research aims to identify the psychological security of students in the kindergarten department and identify if there is a significant difference between stage one and stage four students. To do this, the researcher adopted the psychological research scale of (Al-mohamdawi, 2007) that consisted of (30) items. It was administered to (120) female students chosen randomly from the kindergarten department in the college of education for women for the academic year (2029-2021). The results revealed that students in the kindergarten department have psychological security. There is a significant difference between stage one and four students in favor of stage four students.
Praise be to God, Lord of the worlds, and the outcome is for the righteous, and prayers and peace be upon the author of the clear communication, to whom was revealed the saying of the Lord of the worlds (And We have sent down to you the message that you may make clear to the people what has been sent down to them, and that they may reflect.)
His family, companions and followers, as for what follows:
Among the Qur’anic studies related to Islamic matters, ancient and modern, (the clear and similar in the Holy Qur’an), and due to the importance of the topic, we found the attention of scholars to it.
With many studies and research on it, and their efforts in overcoming its major obstacles, you will not find a scho
... Show MoreGod is the source of every grace in which man lives and enjoys, and there is no one in the world told himself that created and destined and ridiculed and found out of nothing God Almighty alone.
The grace is an affliction from God Almighty, when God Almighty blesses his servant with money or children and others, the slave thinks the acceptance of God Almighty, but may be a source of affliction and scrutiny.
This research attend about Alienation form for ornament’s clouds in Quran, which includes four parts, the first part talks about the research problem, the researcher identified by following question :( what’s the Alienation form for ornament’s clouds in Quran?). And then the research importance. The research goal talks about Alienation form for ornament’s clouds in Quran. And also research borders, likes means objectives borders, places borders, As well as Terms Definitions, in second part talks about Theoretical framework and previous studies, includes two parts, the first one study Alienation form, meaning and understandable, the second one talks about Alienation form in Islamic arts, As well as the researcher find only one stu
... Show MoreThe increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show More