The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.
This research deals with compound sentences in the German language and how to transform them and transfer them into a main sentence, touching on their functions and characteristics. Actual to nominative, which is a unique feature of the German language, with some diverse examples taken from various sources.This case is distinguished, like other grammatical cases
... Show More
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreIn this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai
... Show MoreMethods of teaching plays an important vole in the educational process
because is the link between the teacher and the learner. The process of
teaching doesut fulfill the desirable results unless the methods of guiding and
teaching are provided and through a qualified educationalist capable of
communicating the syllabus to the students in an easy and clear way. In spite
of the diversity of the methods of teaching ,there is no one way suitable for all
the educational purposes , all the sciences ,all the subjects ,all the levels of
growth ,levels of teaching, maturity and intelligences ,all teachers and
educationalists and all the circum stances surrounding the teaching processes
.The teacher is the one who choos
That corruption with all its forms, has prevailed over the whole world, but with different degrees relaying on the one who leads these countries of rulers, followers and officials who have been deemed the main reason for that corruption, but if these rulers were righteous, These countries would have blessed and elevated and were corrupt unjust tyrants who were the disaster that befell the chiefs of those countries with ruin, misery, and backwardness. This is what we sought to prove and clarify by considering the verses of the Holy Qur’an in respect with this topic. The research includes an introduction, two topics, and a conclusion.
 
... Show MoreIn the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreAdvances in digital technology and the World Wide Web has led to the increase of digital documents that are used for various purposes such as publishing and digital library. This phenomenon raises awareness for the requirement of effective techniques that can help during the search and retrieval of text. One of the most needed tasks is clustering, which categorizes documents automatically into meaningful groups. Clustering is an important task in data mining and machine learning. The accuracy of clustering depends tightly on the selection of the text representation method. Traditional methods of text representation model documents as bags of words using term-frequency index document frequency (TFIDF). This method ignores the relationship an
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreIt is doubtless that the sexual place has some common indicators due to the masculine and feminine bodies which may be natural or deviated (homosexual). The female has an act of voice in the imaginary masculine place whereas the male has an act of image recognized in the parental mind in both the secular and sacred place. Those places create different limits and perceptions according to the auditory and visual readings in search of identity, text and body in the feminine dramatic text.
The research includes four chapters; the first, the methodological framework, involves the problem which is centralized in the following enquiry: What is the relationship between the place and the term of
... Show More(( The Basic word and Terms of sports, games and motions in the Holy Quran : semantic
study )).
The research consists of apreface followed by an Introduction , and three sections and
aconclusion, finally the research concluded with a list of the sources . and also alist of terms
and word in English language for a wider use .
As for reach sections, they are section one it covers a group of words sports games that
are forty two words .
Section two : it covers five fields :-
a- A group of words ( sports ruless) that an seventeen words.
b- A group of ( sports montions ) that are ten .
c- A group of ( sports tools ) that are seven words.
d- A group of ( sports sciences ) that are seven words only .
e- A gro