Preferred Language
Articles
/
bsj-2815
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 13 2020
Journal Name
Sustainability
Consumers’ Perceptions and Attitudes toward Products Preventing Microfiber Pollution in Aquatic Environments as a Result of the Domestic Washing of Synthetic Clothes
...Show More Authors

Microfibers released by synthetic clothes have a significant negative effect on the environment. Several solutions have been proposed and evaluated for their effectiveness, but studies have failed to address the human-centered aspects of these products. In this research, the possibilities and needs from a consumer perspective for a new filtering system for domestic washing machines were examined. First, a quantitative (questionnaire) and a qualitative (interviews and observations) exploration were done to understand the desired requirements from a user perspective. Next, the acceptance of various existing solutions for microfiber catching was investigated. To verify these requirements, a new concept was designed and evaluated with a

... Show More
View Publication
Scopus (21)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Tue Sep 30 2014
Journal Name
Iosr Journal Of Mathematics
Modification Adomian Decomposition Method for solving Seventh OrderIntegro-Differential Equations
...Show More Authors

In this paper, a method based on modified adomian decomposition method for solving Seventh order integro-differential equations (MADM). The distinctive feature of the method is that it can be used to find the analytic solution without transformation of boundary value problems. To test the efficiency of the method presented two examples are solved by proposed method.

View Publication
Publication Date
Wed Jun 01 2022
Journal Name
Political Sciences Journal
The Kurdistan Workers Party (PKK) and its Impact on Iraqi National Security
...Show More Authors

The Turkish Kurdistan Workers Party (PKK) is one of the most influential elements in the Iraqi national security since 2014. It has a new and effective role in the Iraqi political arena, as a result of participating in combat operations against ISIS in Nineveh Governorate, which prompted several minorities within the province to sympathize with its presence and its role in particular in Sinjar  after ISIS committed the most brutal crimes against the Aizidi minority, Turkey took advantage of the security conditions that Iraq went through after the entry of ISIS into the country to expand its influence in the north, using the pretext of the PKK and the previous agreement between the two countries on border protection. Also, the continued

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 21 2020
Journal Name
Frontiers In Medicine
Anxiety, Practice Modification, and Economic Impact Among Iraqi Dentists During the COVID-19 Outbreak
...Show More Authors

Objectives: As health care workers on the front line during the coronavirus (COVID-19) pandemic, dental practitioners are amongst those at risk due to their close contact with potentially infected individuals. The aim of the current study was to assess the anxiety, awareness practice modification, and economic impact amongst Iraqi dentists whilst working during the outbreak.

Methods: This study was performed using an online survey questionnaire with aid of Google forms from 2nd to 23rd July 2020. A total of 484 clinicians responded. The questionnaire was composed of open end, closed end, and Likert five-point scale questions to assess anxiety, awareness and financial impa

... Show More
View Publication Preview PDF
Crossref (33)
Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Tue Feb 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Relationship's Impact Between the External and Internal Auditor in Preventing the Administrative & Financial Corruption: Applied Research in Sample Entities
...Show More Authors

    This research discusses one of the most important means of reducing corruption in public sector companies and government departments, a relationship of cooperation and coordination between the external auditor and internal auditor, in the light of ISA (610), the recommendations of the International Organization of Supreme Audit Institutions (INTOSAI) and the National Strategy to combat corruption. The research was based on two assumptions: the first was weak relationship of cooperation and coordination between the external auditor and internal auditor leads to weakne

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Educational And Psychological Researches
Measuring university teachers attitudes towards the security man
...Show More Authors

Measuring university teachers attitudes towards the security man Summary This research aims to study the measurement of university teachers attitudes towards the security man, and represented the research sample (196) of teachers, including 124 males and 72 females from different faculties of Salah al-Din - Erbil University. The researchers adopted on a scale (Al-Tarawneh 2008), as amended, and its development, the scale consists of four areas and (28) paragraph covers paragraphs measure the beliefs and feelings of the individual towards the security man as the theme of direction. The research sample answered all the paragraphs of the scale grade five similar styles (Likert) (strongly OK, OK, neutral, non-OK, Strongly Disagree). The rese

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Features of genetic algorithm for plain text encryption
...Show More Authors

The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process

... Show More
View Publication
Scopus (15)
Crossref (4)
Scopus Crossref
Publication Date
Fri Jun 20 1930
Journal Name
College Of Islamic Sciences
(Which has been criticized in the Holy Quran
...Show More Authors

Numerical and linguistic methods were varied in interpretation unless they were in accordance with the grammar
Texts of speech, and this was one of the methods used by linguists and linguists as well
What they call them (the opposite is the opposite), and this is what the word "pregnancy"
Is a synonym for the term "interpretation." This term was often used for syntax
The physical and linguistic cause when an act exceeds the character in which it is known to be infringed, or when
The use of a tool with a little use of it, especially by scientists who knew about it
Pay attention to grammatical errors. The Arabs may have uttered the word and wanted to denounce it
He went even further when the eraser carried away his abr

... Show More
View Publication Preview PDF