The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.
With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreThe research aims to explain the References of receiving the explicit and implicit knowledge mentioned in the Noble Qur'an. The two researchers adopted the documentary and inductive approach to study the topic. Among the conclusions of the research: The Noble Qur'an dealt with many terms and concepts that refer to the References of making explicit knowledge available, including books, which were represented by the divine books (the Qur'an, the Torah, the Zabur and the Gospel) and their concepts (the book, the Qur'an, the guidance, the remembrance, the revelation, the light, the newspapers, the plates). He dealt with many concepts that refer to the References of providing tacit knowledge, which was represented by the communication between tw
... Show MoreThe paper has been summarized into the following:
Chapter one: the researcher deals with the problem of the paper, the most important points and the terminology. Chapter two: the researcher deals Surat Luqman from the Aya 12-19 , (the demonstration, the explanations, the values ). In chapter three the researcher deals with Surat AL-Hujurat from Aya 6-12, (the demonstration, the explanations, the values ). Chapter four include (the educational properties for individual and society, the educational applications, and the most important indicators in the texts). Chapter five include the results , the conclusions and the recommendations. One of the basic results that the Quran is a complete educational curriculum, and the texts of Surat Lu
The Turkish Kurdistan Workers Party (PKK) is one of the most influential elements in the Iraqi national security since 2014. It has a new and effective role in the Iraqi political arena, as a result of participating in combat operations against ISIS in Nineveh Governorate, which prompted several minorities within the province to sympathize with its presence and its role in particular in Sinjar after ISIS committed the most brutal crimes against the Aizidi minority, Turkey took advantage of the security conditions that Iraq went through after the entry of ISIS into the country to expand its influence in the north, using the pretext of the PKK and the previous agreement between the two countries on border protection. Also, the continued
... Show MoreThis study presents certain modifications done to the conditions set by Searle
(1969: 57) concerning the speech act of promising in order to render them to selected
sayings of Prophet Muhammad (P.B.U.H.) and Jesus Christ (P.B.U.H.) and to
political texts. These modifications make the conditions of the speech act of
promising appropriate for sincere promises made by the Messengers of God since
they deliver their Messages of God but they are unable, as Messengers, to fulfill
God’s promises which they make as part of their Messages and by representatives of
States who deliver speeches on behalf of their Governments. These are the only two
situations where the speakers can make promises and do not fulfill these prom
Context has occupied a distinguished place as far as the understanding of the texts and deducting the rules from them or analyzing them. The context was considered as one of the important presumptions as far arriving at the desired meanings is concerned. The word is worthless and the meaning is not known unless we know the context in which it came. The context in its two types the lingual and non-lingual types. It is the best for knowing the intended meaning of the Quranic verses to know the real meaning.
The researcher dealt with the importance of striking proverbs in the Holy Qur’an and their uses and benefits in Islamic education and ethics and between the types of proverbs, so it emerged through the study the following things that the proverbs are of three types: authorized, latent, and transmitted, and it has been shown through the current study that the proverb has conditions that the proverb is not valid except There are five: (realism, clarity, environmental, meaning injury, and good pronunciation). If the example violates these conditions, it is not an example. This study showed that proverbs have a prominent role in persuasion, argument, statement, education, clarity, approximation, education, refinement, correct belief, etc.
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show More