The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.
Cities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services which affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban secur
... Show MoreThe problem of text recognition and its applicability as part of images captured in the wild has gained a significant attention from the computer vision community in recent years. In contrast to the recognition of printed documents, scene text recognition is a difficult problem. Contrary to recognition of printed documents, recognizing a scene text is a challenging problem. Many researches focus on the problem of recognizing text extracted from natural scene images. Significant attempts have been made to address this problem in recent past. However, many of these attempts work on utilizing availability of strong context, which naturally limits the dictionary. This paper presents a review of recent papers related to scene text
... Show MoreIn this paper, we present multiple bit error correction coding scheme based on extended Hamming product code combined with type II HARQ using shared resources for on chip interconnect. The shared resources reduce the hardware complexity of the encoder and decoder compared to the existing three stages iterative decoding method for on chip interconnects. The proposed method of decoding achieves 20% and 28% reduction in area and power consumption respectively, with only small increase in decoder delay compared to the existing three stage iterative decoding scheme for multiple bit error correction. The proposed code also achieves excellent improvement in residual flit error rate and up to 58% of total power consumption compared to the other err
... Show MoreThis investigation deals with the use of orange peel (OP) waste as adsorbent for removal of nitrate (NO3) from simulated wastewater. Orange peel prepared in two conditions dried at 60C° (OPD) and burning at 500 °C (OPB). The effect of pH: 2-10, contact time: 30- 180 min, sorbent weight: 0.5- 3.0 g were considered. The optimal pH value for NO3 adsorption was found to be 2.0 for both adsorbents. The equilibrium data were analyzed using Langmuir and Freundlich isotherm models. Freundlich model was found to fit the equilibrium data very well with high-correlation coefficient (R2). The adsorption kinetics was found to follow pseudo-second-order rate kinetic model, with a good correlation (R2
... Show MoreThis study observed the formation of struvite crystals in wastewater using natural zeolite activated with Mg2+ ions. Mg2+ ions released from natural zeolite would react with PO43- and NH4+ ions from in wastewater to form struvite crystals. The results showed that at pH 8.5, the removal of PO43- and NH4+ ions was more effective using the modified zeolite than the natural zeolite. Adding 40 g/L Zeo-Mg (1) produced the best results, with PO43- (93.32%) and NH4 (40%) adsorption. Meanwhile, 40g/L Zeo-Mg (2) adsorbed 81% PO43- ions and 27.12% NH4+ ions. The eqil
... Show MoreAbstract
The curriculum is the major effective tool in achieving the goals of
education and society.
Many countries that want to reach the forefront of developed countries
through their curriculum have realized this fact. School text book, the
application assessment for knowing the rang of success or fail of this text
book in achieving the general aims. therefore this study aims at assessing the
principals and techniques of geography text book for fourth secondary class of
literary studying from the teachers point of view according to the fields of the
book, style of material, technical arrangement of the material, ethnical
arrangement the language of the book, style of the material, technical
arrang
The Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make eac
... Show Moreالحمد لله رب العالمين فاتحة كل خير وتمام كل نعمة ، والصلاة والسلام على خير الأنام رسوله محمد بن عبد الله وعلى اله الأطهار وصحبه الأخيار أما بعد:
تكتسب الصياغة التشريعية أهمية متزايدة في مجال الدراسات القانونية سواء من ناحية فهم عملية إنشاء القاعدة القانونية أو من ناحية تطبيقها على يد المشتغلين في القانون من أساتذة القانون والقضاة والمحامين ، بل أن الصياغة التشريعية غدت مادة تدرس في كثير من كليات القانو
... Show MoreHS Saeed, SS Abdul-Jabbar, SG Mohammed, EA Abed, HS Ibrahem, Solid State Technology, 2020