The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.
The reciprocal relationship between the text and the mask in the printed product is one of the most important relationships that frame the level of communication between the appearance and the interior, although it is not cared for by some designers and publishing institutions. Therefore, the problem of research is determined by the following question (What is the dialectical relationship between the text and the mask in the literary books covers design?). The research aims to shed light on this problematic relationship at the level of reception and aesthetics at the same moment. The theoretical framework included two sections: the first (mask and text ... the concept and the mutual relationship), while the second section (trends in the
... Show MoreThere is no doubt that the advertisement picture and the written text play a key role in the formation of the language of the communicative discourse as the main pillars of the design of commercial advertising and the main entrance for the advertising message awareness... Hence the researcher chose the title of her research (Integrative Relationship between the Picture and the Written Text in the Printed Commercial Advertisement) starting from following questions: What is the relationship between the picture and the written text in the printed commercial declaration? Is there functional, aesthetic and interactive integration between them?
&n
... Show MoreMR Younus, Nasaq Journal, 2022
Text science presented a set of criteria to make the text essentially a project to create
texts and use. Me and means of cohesion script text scientists, two standard foundries and
knitting. Find this means their equivalent in the Arab rhetorical Heritage has been found, it
means foundries find Accompanying represented (link grammar in the classroom and link),
and referrals represented by (Baldmair, Ldefinition, and the name of the signal), and
deletion, and repetition, and presentation delays. As in the standard knitting it has confirmed
Albulagjun Arabs on the semantic consistency between the text components, as reflected in
the moral link in Chapter interfaces, as well as in moral coherence between parts of the te
In this research, the researchers attempted to reveal the non-verbal language in the Holy Qur'an through the hurt of the eye, its communicative effect, and its psychological significance in order to demonstrate the importance of this language. Fold the search ..
Abstract
The Holy Quran is the greatest motivator for the mind to keep pace with life. The doctrine of faith is a requirement of logic and wisdom, and it cannot be reached by the hand of superstition. The Qur’an destroyed the principle of superstition in the verses of the creation of the universe. The principle of inactivity of the Qur’an is a false accusation that collision with the texts of the Qur’an. The secret of scientific development is to harness the laws of nature, benefit from them, and walk according to its requirements, on which the manifestations of civilization and the Qur’an are based
... Show MoreOver the last few decades, many instructors have been trying all kinds of teaching methods, but without benefit. Nevertheless, in the 1986, a new technique is appeared which called K-W-L technique, it is specified for reading comprehension passages because reading skill is not easy matter for students for specific purposes (ESP).therefore, the K-W-L technique is a good one for thinking and experiences. To fulfill the aims and verify the hypothesis which reads as follows" it is hypothesized that there are no significant differences between the achievements of students who are taught according to K-W-L technique and those who are taught according to the traditional method
... Show MoreReliability is an essential measure and important component of all power system planning and operation procedures. It is one of the key design factors when designing complex, critical and expensive systems. This paper presents a fuzzy logic approach for reliability improvement planning purposes. Evaluating the reliability of the complex and large planned Iraqi super grid ;as Al- Khairat generating station with its tie set is intended to be compact to that grid; and determination of the given reliability improvement project are the major goals of the paper. Results show that the Iraqi super grid reliability is improved by 9.64%. In the proposed technique, fuzzy set theory is used to include imprecise indices of different components in normal
... Show MoreThe research problem is that the traditional methods of internal auditing are somewhat heavy with long and rigid procedures for the members of the audit process team, especially in light of the current developments that are reflected in the business environment and internal audit reports, so it is necessary to reconsider the traditional internal audit work method and assess the extent of its development by agile methods to reduce the time of the audit process on the activities and elements that add value and direct the effort and time to the activities and elements that add value to the work of the economic unit and the report of the internal auditor.
The research aims to study the possibility of applying agile internal auditing
... Show More