The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.
Theligand4-[5-(2-hydoxy-phenyl)- [1,3,4- thiadiazole-2- ylimino methyl]-1,5-dimethyl -2-phenyl-1,2-dihydro-pyrazol-3-one [HL1] is prepared and characterized. It is reacted with poly(vinyl chloride) (PVC) in THF to form the PVC-L compounds ,PVC-L interacted with ions of transition metals to form PVC-L-MII complexes .All prepared compounds are characterized by FTIR spectroscopy, u.v-visible spectroscopy, C.H.N.S. analysis and some of them by 1HNMR
The Research deals with the negative phenomena which appeared in the urban scenes of the Iraqi cities after 2003, particularly trespassing the architectural design of the urban Individual houses. Many academic researchers , critics, and cultural circles, drawn attention to the impact of political and cultural variable change on such phenomena without detailed analysis . The research problem is set according to central questions : If the phenomena is the trespass , what
are the sides which are being trespassed in the division of the individual house? , If the diagnosis of the phenomena denotes perceived repetition of the cases , So what's size of this transposes on the architectural design of t
In every system of security, to keep important data confidential, we need a high degree of protection. Steganography can be defined as a way of sending confidential texts through a secure medium of communications as well as protecting the information during the process of transmission. Steganography is a technology that is used to protect users' security and privacy. Communication is majorly achieved using a network through SMS, e-mail, and so on. The presented work suggested a technology of text hiding for protecting secret texts with Unicode characters. The similarities of glyphs provided invisibility and increased the hiding capacity. In conclusion, the proposed method succeeded in securing confidential data and achieving high p
... Show MoreCeremony of the Koran vocabulary animate different connotations unique style patch on
smth not any method of Arabs, has been used used vocabulary and special Madza, he put
every single in place of installation so that if you do not put in place misfire meaning and
became Rkika method. Our goal in this research study a range of vocabulary in terms of the
implications and documenting the trial of the Hadith and sayings of the beneficiaries of Arab
scholars have different attitudes, linguists and interpreters and speakers and fundamentalists,
philosophers, and others.
This study is based on the basic idea: that human communication does not stop at the limits of words spoken, but extends to include the movements of the body and its members, such as the face, hand, eye, hearing, touch, taste, sensation and the public body.
The human movements represented by polarization, frowns, tattoos, and movements are all auxiliary tools that reach meanings and affect others greatly.
Perhaps their importance is also in their ability to translate what is going on in the soul, and to show it to the outside body members, without the control of the human in many cases, it is thus an important factor in the process of human communication.
The purpose of this study is to show the senses of the senses in the
Praise be to God, who made the pegs of the earth and entrusted them with the task of keeping the earth from tilting, and prayers and peace be upon the one to whom the Qur’an was revealed, Muhammad, and upon his family and all his companions.
The topic of mountains is one of the important topics in human life, as God has associated great miracles with them that indicate the perfection of the power of God Almighty. God Almighty says: (And to the mountains, my palms have turned. This is worthy of every rational person to contemplate His signs, the Almighty, in this solid part and safety belt of the earth, in order to reveal the secrets of the mountains and uncover their treasures. The more the researcher studies the mountains and
... Show MoreThis research is based on the study of a group of Quranic verses that share a certain part, and these verses are verses of righteousness, and the word righteousness has been mentioned in the Holy Qur’an eight times, and the number of verses in this word was six verses, in four walls, all of which are from the civil fence which is the cow and was There are five words of righteousness contained in them, and the family of Imran is one word, and the table is one word, and the argument is one word. This study adopts the method of analytical interpretation of the Quranic text is a term that means statement and clarification in a way that the researcher produces to divide a Quranic text into its elements that are involved in its formation and
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show MoreThank God also taught us that thanks . thank meets the blessings and rewards mazidk glory we have no knowledge except what you have taught you Alim hakim , not counted praise you as yourself praised and pray and to recognize the envoy mercy to the worlds , prophet Mohammed and his family and companions and guided to the day of judgment .
But after :
Aware of the interpretation of the most important science needed by Muslims because God Almighty sent down the Quraan to be a way of the life for Muslims is subject to a healing for what is in the breasts and it slaham and flaham and has spared the nation from crisisThe stats of the monks , like other verses talking about Christians and Jews and what they have invented in the religion o