The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.
The aim of this message to monitor this phenomenon throught the Quran , which is the constitution of the Islamic nation and Hariatha as well as to express kasalah integrity , justice honesty , patience , abd pacr .
We feel this vocabulary to hight athical values advocated by the Quran and the need to build commitment to the orthodox society free of corruption that leads ta a disorder of the human society .
The outcome of the study the researcher found that faith to a number of results was most notably the advent of righteusness in the Holy Quran meaning of comprehensive RPR spacious field and breadth Maadenh .
The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show MoreThe text has many connotations in the Arabic language, such as vowel points, designation, completion, etc., and the original meaning of the text is to show. The Western text has its owen independent semantic unit .The biblical texts are a mixture of what was reported by the Prophet Moses (peace be upon him) and what the authors described in terms of texts over many centuries.The meaning of the text is guidance and payment, and it is a natural connotation. The religious text for Muslims is divided into peremptory texts that are national proof. The evidence for the meaning of the text is proven by language, and it is not required that the researcher be a jurist. The approach is a factual questionnaire by the researcher according to a speci
... Show MoreThe world went through turmoil before the sixth century AD, and human societies were in conflict and rivalry, each strong state is a weak state-dependent, but the dominant societies made the slave societies to them .. And thus made many societies or civilizations system of classes, and differentiation between members of one community, Weakened its strength and go alone. As the Islamic society in the present weak and weak and falling to the lowest levels of civilizational underdevelopment in the organization of society and social security contrary to what it was Islamic civilization, because of our distance from the heavenly instructions, and this prompted many to walk behind Western ideas aimed at the demolition of Islamic civilization,
... Show MorePraise be to God, Lord of the worlds, and prayers and peace be upon our master Muhammad and upon his family and companions.
We see human societies differ from one society to another in organizing social life, and each according to the foundations and rules prepared by the main thing in the welfare and prosperity.
That is why we see eastern societies differ from western societies in many patterns and various ways of reaching that sophistication, until Islam came and gave the proper model in raising society at that time to the best and highest social levels, because it is based on heavenly rules and foundations and not status as in previous civilizations.
And when the Islamic community has
The definition of the role of any institution in society is achieved through its objectives, The same is true for the military and how to deal with security threats in the humanitarian field ,Terrorism, which has almost replaced the traditional pattern of war, has waged a street war and intimidated individuals, families and society ,On the other hand, he found someone to meet him from a popular crowd of volunteers to defend their homeland from different sects, sects and religions, Thus, our study will be exposed to the role of popular mobilization in human security from a sociological point of view in Samarra, a field study of 100 male and female respondents.
This study aimed to evaluate the preparedness and adherence of community pharmacists to the International Pharmaceutical Federation (FIP) Health Advisory COVID-19 guidelines for pharmacists (July 2020) during COVID-19 pandemic. This was a cross-sectional study based on electronic survey using google form, which was distributed from November 19, 2020 to January 1, 2021 using social media platforms. The survey measured 21 pharmacy preventive measures (PM). A multivariate regression analysis was used to identify factors influencing pharmacy implementing of PM. Hand disinfection after serving patients represented the main adopted measure (89.3%). Surprisingly, only 35.4% of participants implemented the proper ways of hand disinfection during fa
... Show MoreTechnological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations,
... Show MoreIt is no secret to anyone that the Koran is a speech to people, and how it is not a speech to humans is a home to them and suitable for their understandings, and the people of rhetoric mean great care has never been before in the division of the Koranic discourse, followed by linguists and science of the Koran. After reading the letter, I followed it in the Holy Quran, taking advantage of what was written by former writers in language and interpretation. Thanks to God, I have done what I wanted. Perhaps one of the most important reasons that led me to write my research and optional for this topic; is related to the Koran. So I started to develop the research plan, and divided it as I saw it, I started to pave the way, and then divided it
... Show More