Preferred Language
Articles
/
bsj-2815
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 01 2017
Journal Name
International Journal Of Scientific & Engineering Research
Integrated System of Information hiding by Applying Three levels
...Show More Authors

MB Mahmood, BN Dhannoon

View Publication
Publication Date
Thu Dec 31 2020
Journal Name
Political Sciences Journal
The problem of applying Sharia in contemporary Islamic thought
...Show More Authors

The Islamic Issue did not rise the “widespread arguments” in contemporary times, just as the issue of applying Islamic Law.  Just as the Islamic forces used this purpose, or employed it during their march to reach to power by adopting the sacred as motivation towered the power, or control the governance. However, the reality show that this goal remained within the boundaries of slogans in the sense of a teleological slogan, and did not go beyond the limits of advocacy or arrangement as the primary source of legislation with differences of teleological reasoning, in a manner that reflected an intellectual problem about the validity of the use of this concept or the ability to apply and enforce the law in today's world, to impose

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
THE PROBLEM OF RANDOMSLAUGHTER IN BAGHDAD AND THE POSSIBILITY OF APPLYING MOBILE SLAGHTERHOUSEES TO REDUCE THEM: THE PROBLEM OF RANDOMSLAUGHTER IN BAGHDAD AND THE POSSIBILITY OF APPLYING MOBILE SLAGHTERHOUSEES TO REDUCE THEM
...Show More Authors

One of the most important elements of achieving food security is livestock, which is an essential element in the agricultural sector, and is one of the state support sectors. Animal production (sheep) ranked an important position in this sector due to the economic advantages that are available when rearing. Moreover, the success and development of sheep breeding depend on several factors, including financial return and achieving profitability. The study aims to identify the phenomenon size of random slaughter as a problem, which spread in Baghdad and its causes and the factors that influencing its development. As well as, the possibility of applying the idea of a​​mobile slaughterhouse to reduce this phenomen

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Peaceful settlement as a means of preventing tax: An applied research in the General Commission for Taxation evasion
...Show More Authors

The reconciliation of tax reconciliation is one of the legal methods used by the financial authority in Iraq, which is done with the taxpayer

The research dealt with the weakness of tax revenues for many reasons, including tax evasion, which led to the search for ways to reduce evasion to increase the tax revenue, and settlement reconciliation one of these means .

The research proceeded from the premise that the use of a more broadly settled settlement would govern the tax evasion of taxpayers.

The researchers used a series of studies and previous research, books and other sources related to the subject of research, and this was done through the theoretical framework, and the practical aspect that included the fin

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2011
Journal Name
Iraqi Journal Of Physics
Surface Modification of Ti-6Al-4V Alloy by Glow Discharge-Plasma Nitriding
...Show More Authors

Titanium alloy (Ti-6Al-4V) samples were nitrided in low pressure (1.3, 3 mbar) dc-glow discharge plasmas of nitrogen. The treating time was 5, 10 and 15 hour and the temperatures range of the samples during the nitriding process was close to 800oC. The obtained microstructures of the nitride layers were studied by x-ray diffraction and optical microscopy. The ε –Ti2N, ζ-Ti3N3-x and η-Ti3N2-x.phases were formed and addition to the solid solution of nitrogen in titanium, α (Ti,N). Micro hardness measurements exhibit an increment for the Ti-alloy specimens which nitrided at 800oC for 10 and 15h.Corrosion measurements were obtained for the Ti-6Al-4V alloy in Ringer solution after plasma nitriding. The clear improving in the corrosion r

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today:proceeding
Modification of CR39 surfaces by 193 nm ArF laser for biomaterial sensing
...Show More Authors

Scopus (3)
Scopus
Publication Date
Thu Jul 06 2017
Journal Name
Al-mustansiriyah Journal Of Science
Modification the ELISA Kit for diagnosis of Psedudomonas aeruginosa and comparing its with ordinary ELSA Kit
...Show More Authors

Publication Date
Tue Apr 14 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of nano surface modification on CPTi dental implant using chemical method: mechanical and histological evaluation
...Show More Authors

Background The application of nanotechnology to biomedical surfaces is explained by the ability of cells to interact with nanometric features. The aim of this study was to consider the role of nanoscale topographic modification of CPTi dental implant using chemical etching method for the purpose of improving osseointegration. Materials and methods: Commercial pure titanium rod was machined into 20 dental implants. Each implant was machined in diameter about 3mm, length of 8mm (5mm was threaded part and 3mm was flat part). Implants were prepared and divided into 2 groups according to the types of surface modification method used: 1st group (10 implant) remained without nano surface modification (control), 2nd group include (10 implant) etche

... Show More
View Publication Preview PDF