Preferred Language
Articles
/
bsj-2815
Applying Quran Security and Hamming CodesFor Preventing of Text Modification

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Oct 12 2022
Journal Name
College Of Islamic Sciences
The Concept of the Text, its Divisions, Connotations, and Methodology

The text has many connotations in the Arabic language, such as vowel points, designation, completion, etc., and the original meaning of the text is to show. The Western text has its owen independent semantic unit .The biblical texts are a mixture of what was reported by the Prophet Moses (peace be upon him) and what the authors described in terms of texts over many centuries.The meaning of the text is guidance and payment, and it is a natural connotation. The religious text for Muslims is divided into peremptory texts that are national proof. The evidence for the meaning of the text is proven by language, and it is not required that the researcher be a jurist. The approach is a factual questionnaire by the researcher according to a speci

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 29 2020
Journal Name
Iraqi Journal Of Science
A Descent Modification of Conjugate Gradient Method for Optimization Models

In this paper, we suggest a descent modification of the conjugate gradient method which converges globally provided that the exact minimization condition is satisfied. Preliminary numerical experiments on some benchmark problems show that the method is efficient and promising.  

Scopus (5)
Crossref (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Evaluating Windows Vista user account security

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa

... Show More
Crossref
View Publication Preview PDF
Publication Date
Wed Aug 31 2022
Journal Name
Iraqi Journal Of Science
Consumer Use of E-Banking in Iraq: Security Breaches and Offered Solution

    After the software revolution in the last decades, the field of information technology had a tremendous evolution that made many organizations reach the best benefits from this evolution in technologies. The banking sector evolved their old system from ordinary system to the online system. The term E-banking appears to cover almost all bank operations such as money transactions, account management, instant reports, instant notifications. E-banking offers several advantages to clients, but this opens many challenges and motivates unauthorized parties to focus on creating methods and exploiting weaknesses to attack and steal critical information that belongs to the banking system or clients. Iraqi banks recently adopted E-banking se

... Show More
Scopus (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Translating the Genre of Quran: the Challenge of translating the inimitable: Translating the Genre of Quran: the Challenge of translating the inimitable

Abstract
The main question raised in this paper is: Is it possible to translate the ‘genre’
of Quran? And if this ‘genre’ is Quran specific, a ‘genre’ of its own, i.e. a unique one,
how can the Quranic text be translated from Arabic into English or any other
language? This question has been raising a lot of controversy among translation
theorists, linguists, philosophers and scholars of Islam and specialists in the sciences
of Arabic language let alone Quran exegetes. Scholars of the Arabic language and
scholars of Islam have argued that because of the genre of Quran is the genre of (ijaz),
translatability can never be possible. Equivalence, thus, cannot be achieved especially
if we know that so far

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2013
Journal Name
2013 Sixth International Conference On Developments In Esystems Engineering
Ensure Security of Compressed Data Transmission

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p

... Show More
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
View Publication
Publication Date
Tue Jun 30 2015
Journal Name
College Of Islamic Sciences
The Logic of Freezers and Animals in the Holy Quran: (Objective study

The Logic of Freezers and Animals in the Holy Quran

View Publication Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Indication of body overtones and movements at The Holy Quran (Descriptive study)

That communication between people is not only through speech but includes other images of the most important body inspiration. And that the Koran worked on the diversity of ways in which the meanings of the hearer and did not stop at the limit of speech, but included situations where the use of body inspiration and indicate its importance in communication. However, signals and organ movements play a major role in the process of communication between people. Facial and hands movements play an important role in the communication process as they are a tool for communicating ideas to others.

View Publication Preview PDF
Publication Date
Thu Aug 22 2019
Journal Name
Separation Science And Technology
Scopus (38)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Fri Mar 13 2020
Journal Name
Sustainability
Consumers’ Perceptions and Attitudes toward Products Preventing Microfiber Pollution in Aquatic Environments as a Result of the Domestic Washing of Synthetic Clothes

Microfibers released by synthetic clothes have a significant negative effect on the environment. Several solutions have been proposed and evaluated for their effectiveness, but studies have failed to address the human-centered aspects of these products. In this research, the possibilities and needs from a consumer perspective for a new filtering system for domestic washing machines were examined. First, a quantitative (questionnaire) and a qualitative (interviews and observations) exploration were done to understand the desired requirements from a user perspective. Next, the acceptance of various existing solutions for microfiber catching was investigated. To verify these requirements, a new concept was designed and evaluated with a

... Show More
Scopus (17)
Crossref (20)
Scopus Clarivate Crossref
View Publication