The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.
(( The Basic word and Terms of sports, games and motions in the Holy Quran : semantic
study )).
The research consists of apreface followed by an Introduction , and three sections and
aconclusion, finally the research concluded with a list of the sources . and also alist of terms
and word in English language for a wider use .
As for reach sections, they are section one it covers a group of words sports games that
are forty two words .
Section two : it covers five fields :-
a- A group of words ( sports ruless) that an seventeen words.
b- A group of ( sports montions ) that are ten .
c- A group of ( sports tools ) that are seven words.
d- A group of ( sports sciences ) that are seven words only .
e- A gro
Although Israel's national security strategy, shaped by Ben Gurion in the 1950s, has remained steadfast, Israeli leaders have been keen to adapt and change some of its means and tools to maintain its national security. These changes were a response and adaptation to the complex and geostrategic transformations in the region since the end of the cold war. Traditional challenges to Israel's national security have declined as unconventional challenges have increased. This shift has adversely affected the efficiency and effectiveness of Israel's national security strategies. It has become necessary for Israel to confront regional actions taken by minor states and regional actors that have ensured the accumulation of its military capabilities. M
... Show MoreThe research tagged with (similar rulings in the holy heavenly books - the Holy Qur’an and the Bible) highlights that there are a number of rulings in the heavenly books that are similar to each other in terms of content, meaning and significance and did not change from one prophet to another because they relate to the basic interests on which social relations are built. Documenting ties, preserving rights, preventing abuse, etc. These are among the divine purposes in clarifying rulings in order to reach their goals and achieve their goals. Therefore, by combining these rulings, many problems and incidents that are the subject of disagreement and doubt between the two religions can be achieved and addressed. Those who want reform, righ
... Show MoreEach educational system aims at having an effective way of
teaching that leads to an effective learing.This needs preparing good inputs in their standard qualifications and good effective ways in the phae of processes during which reliable and valid methods and technjqucs of teaching are used.
Instructional techniques have gained, lately, an increasing and
great attention of educationists because of their many techniques arc Frcinet's which they can be applied in our cducutional institution (schools, institutes and colleges),after giving a brief profile of Frcint
and his educa tiona! ideas and his innovations in the field of
instructional techniques.<
... Show MoreAs contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak o
... Show MoreThe purpose of the present study is to identify the comprehensive concept of desertion through the Holy Qur’an and to derive some educational implications related to the concept of desertion and its editing. The also aims to explain the images and forms of desertion. The researcher used the qualitative analytical method. The study concluded that the comprehensive concept of desertion was represented in moving from the country of polytheism to the country of Islam, singularity, alienation, and isolation, leaving, repelling and showing off, abandoning the wife in bed, and reciting from the Qur’an recitation, action, and arbitration, insulting, abandoning, delirium, intersection, and manipulation. The researcher has drawn many education
... Show Morethe research goal is preparing a list of standard criteria and quality controls for information technology applications to serve the Holy Quran.
To achieve this goal, the researcher has built a list of criteria according to the following steps:
First - identify the key areas covered by the whole list which are:
1 – Standards of system building and implementing with the operating screens.
2 – Standards of display forms including audio and video presentation.
3 – Standards which are related to the program philosophy.
4 - Standards which are related to the program objectives.
... Show MoreThe research aims to measure the psychological security of social working in the courts, to measure the motivation of achievement for social researchers working in the courts. In addition to, identify the Psychological security and its relation to the motivation of achievement for social researchers working in the courts. To achieve these aims, the researcher adopted two scales: Maslow scale for Psychological security, which was translated to Arabic by Dwany and Dirany 1983 consisted of (75) items. The second scale is Othman scale for achievement motivation 2014 consisted of (24) items. The two scales had been applied to a sample consisted of (100) social researchers working in the courts of Baghdad with its two branches Al-karkh and Al-
... Show MoreThe absurdity of Orientalist thought and its deviation in interpretation
Quranic text
View and critique
The present paper is an experimental study to improve the productivity of the conventional solar still. This done by modifying conventional still in a way that the distilled basin is larger than distillation basin, thus providing an increase in the condensation surface and speeding up the condensation process. Moreover, increase in the dimensions of the distilled base helps coupling reflective panels to the distilled base to reflect incident solar radiation to the distillation basin. For this purpose , two solar stills were made, one conventional designand another made according to the proposed design. The two solar stills were tested during the period from February to July 2009 under varying weather conditions of Basra, Iraq (latitude o
... Show More