The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.
Research summary
The researcher in theological sects finds that the controversial issues between the owners of the sects are many, filled with the books of the sects, articles and creeds, and when examining these books it became clear to us that the dispute is related, some of it is related to the meaning and some of it is related to the words and it is many, explained to us by rhetorical terminology such as guidance and delegation, Interpretation and others, and part of it is what is called the verbal disagreement, and sometimes it is by using common possible expressions of truth and falsehood, as in the saying of the Kharijites, “The judgment is only for God,” and some of it is related to something outside th
This paper presents a complete design and implementation of a monitoring system for the operation of the three-phase induction motors. This system is built using a personal computer and two types of sensors (current, vibration) to detect some of the mechanical faults that may occur in the motor. The study and examination of several types of faults including (ball bearing and shaft misalignment faults) have been done through the extraction of fault data by using fast Fourier transform (FFT) technique. Results showed that the motor current signature analysis (MCSA) technique, and measurement of vibration technique have high possibility in the detection and diagnosis of most mechanical faults with high accuracy. Subsequently, diagnosi
... Show MoreThis article focuses on the relationship of gender to the effectiveness of both women and men in public relations work. Its aim is to identify the extent to which public relations employees are aware of the concept of gender, and to reveal the role of the institution in determining certain roles for both women and men at work, as well as to find out which employees are most effective in public relations activities within the institution.
The researcher uses public relations employees and officials in Iraqi ministries as a research sample to capture the point of view of both parties on the effectiveness of workers in public relations based on the definition of gender. The sample consists of 396 individuals
... Show MoreThe present study investigated the total content of phenolic compounds, antioxidant and antimicrobial activities of water extracts oat (Avena sativa) and basil (Ocimum basilicum), medicinal plants. The Folin-ciocalteu reagent assay was used to estimate the total phenolic content of plants extract. The antioxidant capacity of the plants extract was tested by ferric reducing/antioxidant power Assay (FRAP) and ferric reducing scavenging activity using DPPH method, and the antimicrobial activity was measured against [Staphylococcus epidermidis; Staphylococcus aureus; Proteus spp.; Klebsiella spp.; Escherichia coli; Candida albicans] as tester strains. The total phenolic content of Avena sativa and Ocimum basilicum extracts revealed that the
... Show MoreDigital change detection is the process that helps in determining the changes associated with land use and land cover properties with reference to geo-registered multi temporal remote sensing data. In this research change detection techniques have been employed to detect the changes in marshes in south of Iraq for two period the first one from 1973 to 1984 and the other from 1973 to 2014 three satellite images had been captured by land sat in different period. Preprocessing such as geo-registered, rectification and mosaic process have been done to prepare the satellite images for monitoring process. supervised classification techniques such maximum likelihood classification has been used to classify the studied area, change detection aft
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe research aims at identifying the importance of scientific research for researchers and in creating new knowledge، development and utilization of mental and cognitive energies and developed them with the ability to research، extrapolation، meditation and then conclusion. The information was collected by interviewing the Secretary-General of the Central Library and by distributing questionnaire forms to the (33) teaching staff of the College of Higher Education. The responses of the society were analyzed the result and the recommendations were the most important 1. Information specialist and all employees of the administrators and technicians in the centers of information sources (libraries) and in the field are considered scientific r
... Show MoreDiabetic neuropathy is a form of nerve damage that can occur in people who have diabetes. High blood sugar (glucose) induced nerve damage in every part of the body. The nerves in the legs and feet were the most frequently affected. The extent to which a diabetic patient's body is impaired is calculated by the degree of nervosa harm.The purpose of this present study is estimation BMI,IL-10 , nesfatin-1 and HS-CRP in Iraqi DN patients before and after treatment via tegretol as well as it is the first study sheds light on the relationship between Nesfatin -1 and other parameters ( BMI,IL-10 and HS-CRP) also predication of Nesfatin-1 as a newly biomarker in patients with diabetic neuropathy. The present study consist of from 30 cohort G1 as hea
... Show MoreAbstract The dissemination of knowledge is no longer confined to schools and universities, not even books. For nearly two centuries, the media have become prominent in disseminating knowledge and culture, in its public and particularly political aspects. After the development of the media from newspapers and magazines to the visual media, their role has increased from the dissemination of abstract information and abstract knowledge towards the process of forming new knowledge through what it publishes and broadcasts from different programs such as drama, news and talk shows. The impact of the media has changed the overall community awareness. Half a century ago the media was not so powerful and widespread. The evolution of the 1990s made
... Show More