The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.
The method of Similarity of important topics in Arabic Rhetoric has ample evidence in the Qur'an and the Hadith and the words of the Arabs and this study is limited to only the Koran.
There have been Similarity in the Holy Quran on both types : investigative and discretion , but the verses are more Similarity investigative and in verse 49 Similarity investigative and in verse 25.
The rush of Albulageyen and many other examples of Quranic Vmtheloa on Similarity , with a linguistic analysis and return to the origins of the meanings are not properly counted Similarity , Kolvaz cunning , deception , and maliciousness , the bad and ridicule.
This study seeks as much as possible to the statement of this phenomenon and stand on these t
Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the m
... Show MoreA steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
The aim of this message to monitor this phenomenon throught the Quran , which is the constitution of the Islamic nation and Hariatha as well as to express kasalah integrity , justice honesty , patience , abd pacr .
We feel this vocabulary to hight athical values advocated by the Quran and the need to build commitment to the orthodox society free of corruption that leads ta a disorder of the human society .
The outcome of the study the researcher found that faith to a number of results was most notably the advent of righteusness in the Holy Quran meaning of comprehensive RPR spacious field and breadth Maadenh .
The current research aims to determine the intellectual security and the psychological resilience of Secondary school students and how these two variables are related to each other. The study also seeks the extent to which psychological resilience contributes to intellectual security
The research sample consisted of (420) students from the Secondary stage in the Directorate of Education of Baghdad / Rusafa III. Two scales were administered to the participants to collect the needed data. As for the analysis of data, Pearson correlation coefficient, T-test, and the Regression analysis were employed, the results revealed:
- The members of the sample have an intellectual Security.
- The members of the sample have
It is no secret to anyone that the Koran is a speech to people, and how it is not a speech to humans is a home to them and suitable for their understandings, and the people of rhetoric mean great care has never been before in the division of the Koranic discourse, followed by linguists and science of the Koran. After reading the letter, I followed it in the Holy Quran, taking advantage of what was written by former writers in language and interpretation. Thanks to God, I have done what I wanted. Perhaps one of the most important reasons that led me to write my research and optional for this topic; is related to the Koran. So I started to develop the research plan, and divided it as I saw it, I started to pave the way, and then divided it
... Show MoreThe lexical connotation is one of the types of connotation that linguists have dealt with, and stipulated in their studies, meaning access to the real meanings of the words, that the lexicon can address after tracing the real meaning of the metaphorical meanings, if any, and this is known to the semantics additional significance, and the rhetorical meaning Figuratively.
The miraculous Qur'an in its systems often refers to the metaphorical uses of the words as well as the real use. The significance of the words in the Holy Qur'an came in a variety of contexts, making each word a special significance that belongs to it exclusively. This is the miracle of the Holy Qur'an. The coming of the slow walk, with its eight words (came, came, cam
Research summary
The first step towards the goal of coexistence with diversity, we must all recognize each one of us the rights of others regardless of his religion, color, gender, and point of view, and that each one agrees with his partnership with others, and a person’s belonging to a religion or doctrine must be based on conviction and self-motivation, and that the true Sharia prohibits a Muslim To impose on others what they do not believe and believe in, for God Almighty did not give His Prophet this right, so how about others, and it is not surprising for everyone that disharmony and rivalry impede the attempt to advance in society, and it is natural that our enemies take advantage of our division among us,