The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.
Methods of teaching plays an important vole in the educational process
because is the link between the teacher and the learner. The process of
teaching doesut fulfill the desirable results unless the methods of guiding and
teaching are provided and through a qualified educationalist capable of
communicating the syllabus to the students in an easy and clear way. In spite
of the diversity of the methods of teaching ,there is no one way suitable for all
the educational purposes , all the sciences ,all the subjects ,all the levels of
growth ,levels of teaching, maturity and intelligences ,all teachers and
educationalists and all the circum stances surrounding the teaching processes
.The teacher is the one who choos
Virtual organization is similar to traditional organization in principles, but is different in the ways it operates. It requires small creation costs compared to the traditional and it uses electronic commerce as the market place and distribution channel for its products and services.The aim of this article is to applying electronic commerce for a proposed virtual organization. The tools used to build an effective web application for virtual organization to provide virtual environment to the customers to do the transaction activities online include PHP, MySQL and Apache. HTML is used for displaying forms and tables and JavaScript is used for verification in client side. Finally, connecting it to 2Checkout.com company as a third party to per
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
That corruption with all its forms, has prevailed over the whole world, but with different degrees relaying on the one who leads these countries of rulers, followers and officials who have been deemed the main reason for that corruption, but if these rulers were righteous, These countries would have blessed and elevated and were corrupt unjust tyrants who were the disaster that befell the chiefs of those countries with ruin, misery, and backwardness. This is what we sought to prove and clarify by considering the verses of the Holy Qur’an in respect with this topic. The research includes an introduction, two topics, and a conclusion.
 
... Show More(( The Basic word and Terms of sports, games and motions in the Holy Quran : semantic
study )).
The research consists of apreface followed by an Introduction , and three sections and
aconclusion, finally the research concluded with a list of the sources . and also alist of terms
and word in English language for a wider use .
As for reach sections, they are section one it covers a group of words sports games that
are forty two words .
Section two : it covers five fields :-
a- A group of words ( sports ruless) that an seventeen words.
b- A group of ( sports montions ) that are ten .
c- A group of ( sports tools ) that are seven words.
d- A group of ( sports sciences ) that are seven words only .
e- A gro
The research tagged with (similar rulings in the holy heavenly books - the Holy Qur’an and the Bible) highlights that there are a number of rulings in the heavenly books that are similar to each other in terms of content, meaning and significance and did not change from one prophet to another because they relate to the basic interests on which social relations are built. Documenting ties, preserving rights, preventing abuse, etc. These are among the divine purposes in clarifying rulings in order to reach their goals and achieve their goals. Therefore, by combining these rulings, many problems and incidents that are the subject of disagreement and doubt between the two religions can be achieved and addressed. Those who want reform, righ
... Show MoreThe objective of this study was to investigate the prophylactic roles of human enteric derived Lactobacillus plantarum L1 (Ll) and Lactobacillus paracasei L2 (L2), on EHEC O157:H7 infection in rodent models (In vivo). The Lactobacillus suspensions (L1 and L2) were individually and orally administered to experimental rats at a daily two consecutives of 100 μl (108 CFU/ ml/rat) for up to two weeks. Thereafter, on the 8th day of experiment rats were orally challenged with one dose infection of EHEC (105 CFU/ml/rat). Animals mortality and illness symptoms have been monitored. There was no fatal EHEC infection in rats that had been pre‑colonized with the Lactobacillus strains, while most of EHEC infected rats were died (90%). The
... Show More