Preferred Language
Articles
/
bsj-2815
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 30 2023
Journal Name
Journal Of The College Of Islamic Sciences
The translated text is a second launch of the text (Al-Kharja Al-Muwashah Al- Andalusian as an example
...Show More Authors

Literary translation is one of the most difficult types of translation ,because it conveys feelings that differ from one person to another, and since the language constitutes an obstacle to understanding the Andalusian excerpts, the translators resorted to translating it, and this was a second start to the text, different from its first start, is said from the tongue of the Al-washah , The muwashshah is a poetic art that appeared in Andalusia after the Arabs entered it ,characterized by special system It differs from the traditional Arabic poem, as it has a beginning represented in the beginning of the muwashshah and several equal parts ending with differentrhymes.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 21 2017
Journal Name
Lecture Notes In Computer Science
Emotion Recognition in Text Using PPM
...Show More Authors

In this paper we investigate the automatic recognition of emotion in text. We propose a new method for emotion recognition based on the PPM (PPM is short for Prediction by Partial Matching) character-based text compression scheme in order to recognize Ekman’s six basic emotions (Anger, Disgust, Fear, Happiness, Sadness, Surprise). Experimental results with three datasets show that the new method is very effective when compared with traditional word-based text classification methods. We have also found that our method works best if the sizes of text in all classes used for training are similar, and that performance significantly improves with increased data.

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Mar 13 2020
Journal Name
Sustainability
Consumers’ Perceptions and Attitudes toward Products Preventing Microfiber Pollution in Aquatic Environments as a Result of the Domestic Washing of Synthetic Clothes
...Show More Authors

Microfibers released by synthetic clothes have a significant negative effect on the environment. Several solutions have been proposed and evaluated for their effectiveness, but studies have failed to address the human-centered aspects of these products. In this research, the possibilities and needs from a consumer perspective for a new filtering system for domestic washing machines were examined. First, a quantitative (questionnaire) and a qualitative (interviews and observations) exploration were done to understand the desired requirements from a user perspective. Next, the acceptance of various existing solutions for microfiber catching was investigated. To verify these requirements, a new concept was designed and evaluated with a

... Show More
View Publication
Scopus (21)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Thu Jun 29 2017
Journal Name
College Of Islamic Sciences
Textual jurisprudence and jurisprudence of the science of the text: Linguistic study
...Show More Authors

The modern textual study researched the textuality of the texts and specified for that seven well-known standards, relying in all of that on the main elements of the text (the speaker, the text, and the recipient). This study was to investigate the textuality of philology, and the jurisprudence of the science of the text.

 

View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Political Sciences Journal
The security environment in Northeast Asia between American authority and Chinese influence
...Show More Authors

The security environment for Northeast Asia is extremely important, as it includes most of the international actors (United States of America, China, Russian Federation and Japan), which gives the nature of the interactions of these forces a special importance for the region.

Because of the multiplicity of policies and interests of the active forces in the region, the result has been an unstable regional environment where the interests of the major powers often clash repeatedly on many related issues, which is coupled with the growing efforts of many powers to adopt policies that differ from what they did in the past This resulted in different patterns of relations, which were mainly characterized by competition over regional lea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

View Publication Preview PDF
Crossref
Publication Date
Tue Feb 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Relationship's Impact Between the External and Internal Auditor in Preventing the Administrative & Financial Corruption: Applied Research in Sample Entities
...Show More Authors

    This research discusses one of the most important means of reducing corruption in public sector companies and government departments, a relationship of cooperation and coordination between the external auditor and internal auditor, in the light of ISA (610), the recommendations of the International Organization of Supreme Audit Institutions (INTOSAI) and the National Strategy to combat corruption. The research was based on two assumptions: the first was weak relationship of cooperation and coordination between the external auditor and internal auditor leads to weakne

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Alternative security solutions offered by virtual private network vpn model proposal to use alternatives to Cisco and Microsoft security in al-rasheed bank-delegate general office- northern region
...Show More Authors

The study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.

The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Design a Security Network System against Internet Worms
...Show More Authors

 Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.

View Publication Preview PDF
Publication Date
Sun Sep 30 2012
Journal Name
College Of Islamic Sciences
The benefits of striking proverbs in the Holy Quran
...Show More Authors

The researcher dealt with the importance of striking proverbs in the Holy Qur’an and their uses and benefits in Islamic education and ethics and between the types of proverbs, so it emerged through the study the following things that the proverbs are of three types: authorized, latent, and transmitted, and it has been shown through the current study that the proverb has conditions that the proverb is not valid except There are five: (realism, clarity, environmental, meaning injury, and good pronunciation). If the example violates these conditions, it is not an example. This study showed that proverbs have a prominent role in persuasion, argument, statement, education, clarity, approximation, education, refinement, correct belief, etc.

... Show More
View Publication Preview PDF