Preferred Language
Articles
/
bsj-2815
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Grace in the Holy Quran: Objective study
...Show More Authors

God is the source of every grace in which man lives and enjoys, and there is no one in the world told himself that created and destined and ridiculed and found out of nothing God Almighty alone.
The grace is an affliction from God Almighty, when God Almighty blesses his servant with money or children and others, the slave thinks the acceptance of God Almighty, but may be a source of affliction and scrutiny.

View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Educational values in the Quran: Surat Luqman and AL- Hujurat model
...Show More Authors

The paper has been summarized into the following:
Chapter one: the researcher deals with the problem of the paper, the most important points and the terminology. Chapter two: the researcher deals Surat Luqman from the Aya 12-19 , (the demonstration, the explanations, the values ). In chapter three the researcher deals with Surat AL-Hujurat from Aya 6-12, (the demonstration, the explanations, the values ). Chapter four include (the educational properties for individual and society, the educational applications, and the most important indicators in the texts). Chapter five include the results , the conclusions and the recommendations. One of the basic results that the Quran is a complete educational curriculum, and the texts of Surat Lu

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 02 2021
Journal Name
Psychology And Education Journal
References for Receiving Explicit and Implicit Knowledge in the Holy Quran
...Show More Authors

The research aims to explain the References of receiving the explicit and implicit knowledge mentioned in the Noble Qur'an. The two researchers adopted the documentary and inductive approach to study the topic. Among the conclusions of the research: The Noble Qur'an dealt with many terms and concepts that refer to the References of making explicit knowledge available, including books, which were represented by the divine books (the Qur'an, the Torah, the Zabur and the Gospel) and their concepts (the book, the Qur'an, the guidance, the remembrance, the revelation, the light, the newspapers, the plates). He dealt with many concepts that refer to the References of providing tacit knowledge, which was represented by the communication between tw

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
The Psychological Security of Students in the Kindergarten Department
...Show More Authors

Abstract

The current research aims to identify the psychological security of students in the kindergarten department and identify if there is a significant difference between stage one and stage four students. To do this, the researcher adopted the psychological research scale of (Al-mohamdawi, 2007) that consisted of (30) items. It was administered to (120) female students chosen randomly from the kindergarten department in the college of education for women for the academic year (2029-2021). The results revealed that students in the kindergarten department have psychological security. There is a significant difference between stage one and four students in favor of stage four students.

View Publication Preview PDF
Publication Date
Fri Feb 21 2025
Journal Name
2025 First International Conference On Advances In Computer Science, Electrical, Electronics, And Communication Technologies (ce2ct)
Enhancing Cloud Security Implementing AI-Based Intrusion Detection Systems
...Show More Authors

The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Fri Mar 13 2020
Journal Name
Sustainability
Consumers’ Perceptions and Attitudes toward Products Preventing Microfiber Pollution in Aquatic Environments as a Result of the Domestic Washing of Synthetic Clothes
...Show More Authors

Microfibers released by synthetic clothes have a significant negative effect on the environment. Several solutions have been proposed and evaluated for their effectiveness, but studies have failed to address the human-centered aspects of these products. In this research, the possibilities and needs from a consumer perspective for a new filtering system for domestic washing machines were examined. First, a quantitative (questionnaire) and a qualitative (interviews and observations) exploration were done to understand the desired requirements from a user perspective. Next, the acceptance of various existing solutions for microfiber catching was investigated. To verify these requirements, a new concept was designed and evaluated with a

... Show More
View Publication
Scopus (23)
Crossref (28)
Scopus Clarivate Crossref
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (9)
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Modification of Searle’s Speech Act of Promising in its Application to Selected Religious and Political Texts
...Show More Authors

This study presents certain modifications done to the conditions set by Searle
(1969: 57) concerning the speech act of promising in order to render them to selected
sayings of Prophet Muhammad (P.B.U.H.) and Jesus Christ (P.B.U.H.) and to
political texts. These modifications make the conditions of the speech act of
promising appropriate for sincere promises made by the Messengers of God since
they deliver their Messages of God but they are unable, as Messengers, to fulfill
God’s promises which they make as part of their Messages and by representatives of
States who deliver speeches on behalf of their Governments. These are the only two
situations where the speakers can make promises and do not fulfill these prom

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 30 2014
Journal Name
Iosr Journal Of Mathematics
Modification Adomian Decomposition Method for solving Seventh OrderIntegro-Differential Equations
...Show More Authors

In this paper, a method based on modified adomian decomposition method for solving Seventh order integro-differential equations (MADM). The distinctive feature of the method is that it can be used to find the analytic solution without transformation of boundary value problems. To test the efficiency of the method presented two examples are solved by proposed method.

View Publication