The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.
Background: Laparoscopic cholecystectomy has many difficulties which include port Insertion, Dissectionof the Calot’s Triangle , Grasping of the Gallbladder , Wall thickness, Adhesion and extraction of theGallbladder. Aim of the Study: To predict how difficult cholecystectomy will be from assessing the patientpreoperatively which, in turn, help in decreasing the risks on the patients and preventing post-operativecomplications. Patients and Methods: A prospective study conducted in the department of General Surgeryat Al-Ramadi Teaching Hospital for the period of nine months from 15th of May 2018 till the 15th of February2019. It included 60 patients, all of them were undergone laparoscopic cholecystectomy for Gallstone. Patientswit
... Show MoreThe international system that established the United Nations after the end of the Second World War witnessed many changes. These changes overshadowed the nature of the work of the international organization, especially its first and most important executive organ (the Security Council). This has sometimes weakened and dulled the Security Council's role in performing the tasks stipulated in the Charter of the Organization, which has led the Organization itself to work on reforms within it in general and to seek reforms in the Security Council in particular. Academic and advisory efforts were made to submit proposals for amendment to be reflected on the Council's performance effectiveness.
In the reverse engineering approach, a massive amount of point data is gathered together during data acquisition and this leads to larger file sizes and longer information data handling time. In addition, fitting of surfaces of these data point is time-consuming and demands particular skills. In the present work a method for getting the control points of any profile has been presented. Where, many process for an image modification was explained using Solid Work program, and a parametric equation of the profile that proposed has been derived using Bezier technique with the control points that adopted. Finally, the proposed profile was machined using 3-aixs CNC milling machine and a compression in dimensions process has been occurred betwe
... Show MoreThe research study included the synthesis of a new series of heterocyclic derivatives containing the antibiotic Levofloxacin. The first way provides for the reaction of Levofloxacin with thionyl chloride in benzene as a solvent to give an acid chloride derivative. A new class of acid hydrazide synthesized from Levofloxacin was studied. Schiff bases were produced via the reaction of acid hydrazide with substituted aromatic ketones in methanol. The next stage involved the response of Schiff bases with thioglycolic acid and mono chloroacetic acid in DMF to produce derivatives of the antibiotic levofloxacin that have five heterocyclic members, including the derivatives thiazolidine-4-one and oxazolidine-5-one. The FTIR, 1HNMR, a
... Show MoreImam Muslim bin Qasim al-Qurtubi And his efforts in wound and modification
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show MorePraise be to God, who made the pegs of the earth and entrusted them with the task of keeping the earth from tilting, and prayers and peace be upon the one to whom the Qur’an was revealed, Muhammad, and upon his family and all his companions.
The topic of mountains is one of the important topics in human life, as God has associated great miracles with them that indicate the perfection of the power of God Almighty. God Almighty says: (And to the mountains, my palms have turned. This is worthy of every rational person to contemplate His signs, the Almighty, in this solid part and safety belt of the earth, in order to reveal the secrets of the mountains and uncover their treasures. The more the researcher studies the mountains and
... Show MoreCeremony of the Koran vocabulary animate different connotations unique style patch on
smth not any method of Arabs, has been used used vocabulary and special Madza, he put
every single in place of installation so that if you do not put in place misfire meaning and
became Rkika method. Our goal in this research study a range of vocabulary in terms of the
implications and documenting the trial of the Hadith and sayings of the beneficiaries of Arab
scholars have different attitudes, linguists and interpreters and speakers and fundamentalists,
philosophers, and others.