Text science presented a set of criteria to make the text essentially a project to create
texts and use. Me and means of cohesion script text scientists, two standard foundries and
knitting. Find this means their equivalent in the Arab rhetorical Heritage has been found, it
means foundries find Accompanying represented (link grammar in the classroom and link),
and referrals represented by (Baldmair, Ldefinition, and the name of the signal), and
deletion, and repetition, and presentation delays. As in the standard knitting it has confirmed
Albulagjun Arabs on the semantic consistency between the text components, as reflected in
the moral link in Chapter interfaces, as well as in moral coherence between parts of the text,
in the initiation and completion and disposal. Thus other text standards and found its roots in
the inherited rhetoric and grammar. Has addressed that a detailed search
Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreBuilding a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro
... Show MoreExchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreAchieving reliable operation under the influence of deep-submicrometer noise sources including crosstalk noise at low voltage operation is a major challenge for network on chip links. In this paper, we propose a coding scheme that simultaneously addresses crosstalk effects on signal delay and detects up to seven random errors through wire duplication and simple parity checks calculated over the rows and columns of the two-dimensional data. This high error detection capability enables the reduction of operating voltage on the wire leading to energy saving. The results show that the proposed scheme reduces the energy consumption up to 53% as compared to other schemes at iso-reliability performance despite the increase in the overhead number o
... Show MoreThe training of great importance in the play, in building optic and intellectual broadcast codes tags, and then comes after the recipient at the reception of such codes and decoded tags, and is the rhythm, the color of the most important elements of configuration, consistent with other elements, Kaltmathl, and focus, and harmony, and dissonance
The objective of this study is to determine the extent to which the determinants of organizational support contributed to enhancing the mental status of banking services in a number of banks in Dohuk governorate in order to diagnose the correlation between the perceived organizational support and the mental status of services. Availability in the environment of banks and to enhance the mental position from the point of view of customers as the main hypotheses focused on the nature of the relationship between the dimensions of research among them has been tested these hypotheses using statistical and descriptive methods have been The study concluded that the contribution of organizational support, which is
... Show MoreThe study aimed to identify the reality of the application of cost accounting system in the contracting institutions in Saudi Arabia, and the extent of the reflection of the application of this system on the effectiveness and efficiency of the general performance of these institutions. Where the research community consists of the contracting institutions operating in the Saudi Arabia, and then a suitable random sample was selected from seventy one institutions. The researchers used the historical method to track the previous studies as well as the descriptive approach to conducting the field study. The study data were analyzed by SPSS statistical program.
The results of this study conclude that there is a
... Show Moreتشهد بیئة الأعمال المعاصرة جملة من التغیرات والتطورات التكنولوجیة وتزایداً في حدةالمنافسة، وأتساع الفجوة بین العاملین والإدارة ، وقدرة الإدارة على التمییز بین الموظفین، والمشاركة فيإتخاذ القرارات، الامر الذي یلقي على عاتق شركة التأمین إجراء التغییر التنظیمي لتحقیق تطور فيالخدمات التأمینیة التي تقدمها للجمهور من تنوع التغطیات التأمینیة )الوثائق( والسرعة في تسویةالتعویضات وغیرها من الانشطة التي تمارسه
... Show MoreThe study of this topic is not to underestimate the previous studies but to the great importance of the Sunnis of the report. The reasoning of the Hadiths of the report is a kind of invisibility in that the significance is not a phenomenon such as the emergence of reasoning in the words of words and deeds. With the introduction of all types of Sunnah and protest, there is no difference between them, and that the Sunnis argument like other Sunnah. What we will see in the research.