The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.
The present study aims to develop and apply the unrealistic optimism scale among high school students. The researcher has designed a scale of (38) paragraphs to measure the unrealistic optimism. A sample of (200) male and female students were chosen randomly to collect the needed data. The study found that the unrealistic scale of optimism has good psychometric characteristics. The research sample has a high level of التفاؤل غير الواقعي لدى عينة البحث unrealistic optimism. There is a statistically significant difference between male and female in the unrealistic optimism in favor of the male students. Finally, there is a statistically significant difference between students in the fourth and sixth gra
... Show MoreThe study of triples seeks to deal with the comprehensive nature of the Qur’an texts, and the choice fell on the trilogy of great torment, pain, and humiliation in the Noble Qur’an - an objective study, the title of this research, in which I tried to shed light on these terms, and the nuances between them, and in particular torment The eschatological terminology varied, which can be summed up in three terms, namely the great, the painful, and the offensive. The types of torment, the pain is the painful one that is described by the severity of pain and its horror, as for the humiliating punishment, it is that which humiliates the one who has fallen on it, and the diversity of torment is due to the diversity of sins.
Numerical and linguistic methods were varied in interpretation unless they were in accordance with the grammar
Texts of speech, and this was one of the methods used by linguists and linguists as well
What they call them (the opposite is the opposite), and this is what the word "pregnancy"
Is a synonym for the term "interpretation." This term was often used for syntax
The physical and linguistic cause when an act exceeds the character in which it is known to be infringed, or when
The use of a tool with a little use of it, especially by scientists who knew about it
Pay attention to grammatical errors. The Arabs may have uttered the word and wanted to denounce it
He went even further when the eraser carried away his abr
Praise be to God, who has seen uniting the wonders of manufactures, and pronounced Pthamidh oddity Alambdoat, and swam his creation in different languages, Glory is not equal to one in the earth and the heavens, praise Him, and I bear witness that there is no god but Allah alone with no partner certificate towering branches, and I bear witness that Muhammad is His slave and Messenger sent swage Arab government balance, and clearest statement, and the highest residence and Ohllagha words, and Oovaha Zmama, he pointed the way and advised the creation, and the month of Islam, breaking idols, and showed provisions, uncle Balanaam, God separated blessings and peace upon our Prophet Muhammad and the God of the good and virtuous and his compani
... Show MorePraise be to Allah, Lord of the Worlds, and prayers and peace be upon the prophet as a mercy to the worlds and on his family and companions. The phenomenon of suicide is one of the most expanding social phenomena in the world, where many groups of society of different ages try to put an end to their lives, especially young men and girls. The numbers always remain on the rise, and there is no doubt that the one who does this matter, that he has reasons that made him resort to suicide, and despite that, whatever those reasons. However, this is not a justification for the assault on the soul that God has forbidden to infringe on or lead them to perdition, or to what harms them. Modern psychology has tried to explain this phenomenon and try to
... Show MoreFor in the Holy Qur’an there are vivid examples and speaking models that tell stories of the tyrants who filled the world with tyranny and overwhelmed it with tyranny, and the Holy Qur’an presents these proverbs to people, not so that they may be amused by them, but rather so that they consider and bite with them. For every tyrannical tyrant, he lives within a framework of self-loss, according to him from life he lives and suffices, even without attachment to a principle or an ideal, and in the world of the unconscious with his whims, without any regard for death that is closer to him than his jugular vein, or for an account that does not leave small or great Therefore, the title of my research came to this (Qarun in the Holy Qur’a
... Show MoreThis paper presents new modification of HPM to solve system of 3 rd order PDEs with initial condition, for finding suitable accurate solutions in a wider domain.
The reconciliation of tax reconciliation is one of the legal methods used by the financial authority in Iraq, which is done with the taxpayer
The research dealt with the weakness of tax revenues for many reasons, including tax evasion, which led to the search for ways to reduce evasion to increase the tax revenue, and settlement reconciliation one of these means .
The research proceeded from the premise that the use of a more broadly settled settlement would govern the tax evasion of taxpayers.
The researchers used a series of studies and previous research, books and other sources related to the subject of research, and this was done through the theoretical framework, and the practical aspect that included the fin
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show More