Preferred Language
Articles
/
bsj-2815
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 30 2013
Journal Name
Al-kindy College Medical Journal
MODIFICATION OF TUBULARIZED INCISED PLATE URETHROPLASTY IN HYPOSPADIUS REPAIR FOR PREVENTING FISTULA AND MEATAL STENOSIS.
...Show More Authors

Objective: to evaluate the benefit of coverage of
the urethral repair by dorsal dartos flap as a second
layer for preventing fistula and V like incision on
the tip of the glans for preventing meatal stenosis.
Patients and Methods:
Forty five children included in this study age
ranged ( 11 months – 7 years), they underwent
hypospadias repair between December 2008 to
March 2012, all cases with distal hypospadias,
same technique used for all patients, a combination
of techniques used for reconstruction starting
withtubularized incised plate urethroplasty with deepithelialized
or stripping of the skin from both
sides of U shaped incision surrounding the urethral
plate, adding a V like incision on t

... Show More
View Publication Preview PDF
Publication Date
Mon May 31 2021
Journal Name
Iraqi Journal Of Science
Improving Security of the Crypto-Stego Approach using Time Sequence Dictionary and Spacing Modification Techniques
...Show More Authors

Cryptography steganography is a practical tool for data security. Hybridization of the cryptography with steganography can provide more security by taking advantage of each technique. This work proposes a method for improving the crypto-stego method by utilizing the proposed dictionary method to modified ciphertext. After that, the modified encrypt ciphertext id was hidden in the text by using the proposed method. For cryptography, an Advanced Encryption Standard (AES) was utilized to encrypt the message. The AES employed a 128bit block size and 256bit key size. The ciphertext characters were then replaced by the characters identified by a dictionary list. The dictionary is time-dependent, where each of the equivalent words shift based o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Engineering
Reliability Analysis of Multibit Error Correcting Coding and Comparison to Hamming Product Code for On-Chip Interconnect
...Show More Authors

Error control schemes became a necessity in network-on-chip (NoC) to improve reliability as the on-chip interconnect errors increase with the continuous shrinking of geometry. Accordingly, many researchers are trying to present multi-bit error correction coding schemes that perform a high error correction capability with the simplest design possible to minimize area and power consumption. A recent work, Multi-bit Error Correcting Coding with Reduced Link Bandwidth (MECCRLB), showed a huge reduction in area and power consumption compared to a well-known scheme, namely, Hamming product code (HPC) with Type-II HARQ. Moreover, the authors showed that the proposed scheme can correct 11 random errors which is considered a high

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 01 2016
Journal Name
Al-academy
Semantic Analogy of Quran Text Content Found in Ornamental Figures in Islamic Architecture: وسام كامل عبد الامير
...Show More Authors

This study aims at creating an analogy between Quran text Contents as meanings that have representations as visional shapes within ornamental figures in Islamic architecture. The theoretical framework of the study deals with the concept of semantics and its parts, artistic contents of Quran texts, and ornamental figures in Islamic architecture. The study procedures included a population of (69) figures, (5) of them were chosen deliberately for analysis in accordance with a form that had been presented to a number of experts to ensure its validity. The study reached a number of conclusions, the most significant among them are: adopting natural denotation of direct reference in order to link the ornamental figure to the source it was taken

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jun 30 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
THE ROLE OF SATELLITE CHANNELS IN FORMING TRAFFIC AWARENESS AND PREVENTING ACCIDENTS - A FIELD STUDY: THE ROLE OF SATELLITE CHANNELS IN FORMING TRAFFIC AWARENESS AND PREVENTING ACCIDENTS - A FIELD STUDY
...Show More Authors

The importance of the research comes from dealing with the problem of lack of traffic awareness, which causes accidents and the occurrence of human and material losses, and the research aims to study the role of satellite channels in forming traffic awareness among the public, and a sample was chosen from Baghdad consisting of (280) individuals, male and female, and used the questionnaire tool. To obtain the data, which included several questions, the results were analyzed statistically and several results were reached, the most important of which is that there is an interest among the public in following traffic programs at a rate of one to two hours to receive information through traffic programs and to identify and apply gener

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
AlexNet Convolutional Neural Network Architecture with Cosine and Hamming Similarity/Distance Measures for Fingerprint Biometric Matching
...Show More Authors

In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Tue Dec 11 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Episiotomy preventing approaches among midwives in Kurdistan region
...Show More Authors

Objectives: This study aimed to findout approaches which used by midwives for avoiding episiotomy and assess their knowledge regarding complications of episiotomy in three main cities of Kurdistan region. Methodology: A cross-sectional study was conducted between 1st January and 15th April 2014 in the three biggest maternity teaching hospitals. The study population included all the midwives (n=53) working in delivery rooms. Data were collected through interview with midwives. Results: The Midwives stated the followings as complications of episiotomy: tear into the rectum muscle or rectum itself (52.8%), bleedi

... Show More
View Publication Preview PDF