The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.
HS Saeed, SS Abdul-Jabbar, SG Mohammed, EA Abed, HS Ibrahem, Solid State Technology, 2020
Ceremony of the Koran vocabulary animate different connotations unique style patch on
smth not any method of Arabs, has been used used vocabulary and special Madza, he put
every single in place of installation so that if you do not put in place misfire meaning and
became Rkika method. Our goal in this research study a range of vocabulary in terms of the
implications and documenting the trial of the Hadith and sayings of the beneficiaries of Arab
scholars have different attitudes, linguists and interpreters and speakers and fundamentalists,
philosophers, and others.
Praise be to God, who made the pegs of the earth and entrusted them with the task of keeping the earth from tilting, and prayers and peace be upon the one to whom the Qur’an was revealed, Muhammad, and upon his family and all his companions.
The topic of mountains is one of the important topics in human life, as God has associated great miracles with them that indicate the perfection of the power of God Almighty. God Almighty says: (And to the mountains, my palms have turned. This is worthy of every rational person to contemplate His signs, the Almighty, in this solid part and safety belt of the earth, in order to reveal the secrets of the mountains and uncover their treasures. The more the researcher studies the mountains and
... Show MoreThis study is based on the basic idea: that human communication does not stop at the limits of words spoken, but extends to include the movements of the body and its members, such as the face, hand, eye, hearing, touch, taste, sensation and the public body.
The human movements represented by polarization, frowns, tattoos, and movements are all auxiliary tools that reach meanings and affect others greatly.
Perhaps their importance is also in their ability to translate what is going on in the soul, and to show it to the outside body members, without the control of the human in many cases, it is thus an important factor in the process of human communication.
The purpose of this study is to show the senses of the senses in the
This research is based on the study of a group of Quranic verses that share a certain part, and these verses are verses of righteousness, and the word righteousness has been mentioned in the Holy Qur’an eight times, and the number of verses in this word was six verses, in four walls, all of which are from the civil fence which is the cow and was There are five words of righteousness contained in them, and the family of Imran is one word, and the table is one word, and the argument is one word. This study adopts the method of analytical interpretation of the Quranic text is a term that means statement and clarification in a way that the researcher produces to divide a Quranic text into its elements that are involved in its formation and
... Show MoreIt is not available for us to go back in time and see plays old and it plays giants tragedy ancient Greek (Aeschylus, Sofokls, and yourbedes) through the eyes of a generation ago, and if we were able to go back to Ntegathm play it is certain that we will not taste or Nstassig for much of what we see from these offers will not afford the traditional religious rituals, which was accompanied also dance and music in the style of ancient Greek play was representing a large part of the theater see manifestations Can our eyes and ears we twentieth century audience to accept those appearances, and it was then?
Inevitably it will look like a museum bycollection not only. So we find ourselves in the light of the foregoing forced When you do rem
In the reverse engineering approach, a massive amount of point data is gathered together during data acquisition and this leads to larger file sizes and longer information data handling time. In addition, fitting of surfaces of these data point is time-consuming and demands particular skills. In the present work a method for getting the control points of any profile has been presented. Where, many process for an image modification was explained using Solid Work program, and a parametric equation of the profile that proposed has been derived using Bezier technique with the control points that adopted. Finally, the proposed profile was machined using 3-aixs CNC milling machine and a compression in dimensions process has been occurred betwe
... Show More