Preferred Language
Articles
/
bsj-2815
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 30 2015
Journal Name
College Of Islamic Sciences
The Logic of Freezers and Animals in the Holy Quran: (Objective study
...Show More Authors

The Logic of Freezers and Animals in the Holy Quran

View Publication Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Indication of body overtones and movements at The Holy Quran (Descriptive study)
...Show More Authors

That communication between people is not only through speech but includes other images of the most important body inspiration. And that the Koran worked on the diversity of ways in which the meanings of the hearer and did not stop at the limit of speech, but included situations where the use of body inspiration and indicate its importance in communication. However, signals and organ movements play a major role in the process of communication between people. Facial and hands movements play an important role in the communication process as they are a tool for communicating ideas to others.

View Publication Preview PDF
Publication Date
Wed Apr 08 2026
Journal Name
Plos One
Text encryption through bio-inspired DNA and RNA sequencing
...Show More Authors

Cryptography is the technology of protecting information and communication by means of encoding the sending information. Existing methods often operate within predetermined mathematical structures which can be subject to pattern recognition and which are lack biological randomness. To address these challenges, this paper introduced a new bio-inspired cryptography approach to protect text messages using the coding mechanisms of DNA and RNA materials. The encryption system consists of six steps: encoding the plaintext message into DNA sequences, transcribing DNA into RNA, applying the complementary base pairing, scrambling RNA segments, optional reverse transcription, and encoding the resulting DNA-RNA characters into ciphertext. Rand

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Wed Mar 01 2000
Journal Name
Al-rafidain Collage Conference
The Modification of Median Filter to use as noise reduction procedure
...Show More Authors

Publication Date
Fri Aug 20 2021
Journal Name
Iraqi Journal Of Laser
Pulsed Er,Cr:YSGG Laser For Surface Modification of Dental Zerconia Ceramic
...Show More Authors

Background: Surface treatment of machined dental zirconia for enhancement of the adhesion to resin cement, using Er,Cr:YSGG  Laser. Materials and Methods: Total number of 42 zirconia disc specimens (9 mm diameter, and 2 mm height) was sintered according to the manufacturer instruction. They are divided into six groups, each group of seven samples. Laser groups (Experiment parameters) were depend on laser total irradiation time, pulse duration, and power. Group (A): 20 sec., 60 µs pulse duration. Group (B): 30 sec., 60 µs pulse duration. Group (C): 40 sec., 60 µs pulse duration. Group (D): 20 sec., 700 µs pulse duration. Group (E): 30 sec., 700 µs pulse duration, with different powers used (1, 1

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Educational And Psychological Researches
The Intellectual Security and Its Relation to Psychological Resilience of Secondary School Students
...Show More Authors

The current research aims to determine the intellectual security and the psychological resilience of Secondary school students and how these two variables are related to each other. The study also seeks the extent to which psychological resilience contributes to intellectual security

The research sample consisted of (420) students from the Secondary stage in the Directorate of Education of Baghdad / Rusafa III. Two scales were administered to the participants to collect the needed data. As for the analysis of data, Pearson correlation coefficient, T-test, and the Regression analysis were employed, the results revealed:

  1. The members of the sample have an intellectual Security.
  2. The members of the sample have

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 09 2017
Journal Name
Nauchform
Creolized Text as a Means of Modern Communication: Verbal and Visual Components
...Show More Authors

The article considers a creolized text as a means of modern communication, describing its key verbal and visual components; the relationship of concepts polycode and creolized text has been shown; the universal basic image features have been called; the following kinds of creolized texts have been distinguished; it has been proved that the effective means of attracting the attention of the addressee is the use of expressive font features, which are divided into two groups: topographics (mechanisms of varying of areal syntagmatic of a text) and supragraphcs (change of typeface of font).

Preview PDF
Publication Date
Thu Apr 30 2009
Journal Name
College Of Islamic Sciences
The similar arbitrator in the Holy Quran
...Show More Authors

Praise be to God, Lord of the worlds, and the outcome is for the righteous, and prayers and peace be upon the author of the clear communication, to whom was revealed the saying of the Lord of the worlds (And We have sent down to you the message that you may make clear to the people what has been sent down to them, and that they may reflect.)

His family, companions and followers, as for what follows:

Among the Qur’anic studies related to Islamic matters, ancient and modern, (the clear and similar in the Holy Qur’an), and due to the importance of the topic, we found the attention of scholars to it.

With many studies and research on it, and their efforts in overcoming its major obstacles, you will not find a scho

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 12 2017
Journal Name
Al-academy
Alienation form for ornament’s clouds in Quran
...Show More Authors

This research attend about Alienation form for ornament’s clouds in Quran, which includes four parts, the first part talks about the research problem, the researcher identified by following question :( what’s the Alienation form for ornament’s clouds in Quran?). And then the research importance. The research goal talks about Alienation form for ornament’s clouds in Quran. And also research borders, likes means objectives borders, places borders, As well as Terms Definitions, in second part talks about Theoretical framework and previous studies, includes two parts, the first one study Alienation form, meaning and understandable, the second one talks about Alienation form in Islamic arts, As well as the researcher find only one stu

... Show More
View Publication Preview PDF
Crossref