Preferred Language
Articles
/
bsj-2815
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Rooting non-violence in the Holy Quran And models of the Prophet application
...Show More Authors

The term “non-violence” is a means of political, social, and advocacy that excludes force in reaching its objectives, and lacks infringement of the rights of non-violence. The policy of non-violence is a beautiful logic of the whole of Islamic creation, in that it is an integral part of the whole structure of Islam and it is a policy of brilliant and brilliant saying in the Almighty: `` Neither level nor good or bad, pay what is better, If that between you and him enmity as if he were intimate guardian (Suratvsalat, verse: 34. Has According to the prophet of Islam, it means that God gives to kindness (kindness) what does not give to violence (Sunan Abu Dawood, 4/255). These terms accurately communicate what is meant by violence and n

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Opción
Phraseological units of the idafa type in the Quran
...Show More Authors

Scopus
Publication Date
Thu Jan 10 2019
Journal Name
Journal Of The College Of Education For Women
The Contextual Indication of admonition in the Holy Quran
...Show More Authors

Context has occupied a distinguished place as far as the understanding of the texts and deducting the rules from them or analyzing them. The context was considered as one of the important presumptions as far arriving at the desired meanings is concerned. The word is worthless and the meaning is not known unless we know the context in which it came. The context in its two types the lingual and non-lingual types. It is the best for knowing the intended meaning of the Quranic verses to know the real meaning.  

View Publication Preview PDF
Publication Date
Sun Sep 30 2012
Journal Name
College Of Islamic Sciences
The benefits of striking proverbs in the Holy Quran
...Show More Authors

The researcher dealt with the importance of striking proverbs in the Holy Qur’an and their uses and benefits in Islamic education and ethics and between the types of proverbs, so it emerged through the study the following things that the proverbs are of three types: authorized, latent, and transmitted, and it has been shown through the current study that the proverb has conditions that the proverb is not valid except There are five: (realism, clarity, environmental, meaning injury, and good pronunciation). If the example violates these conditions, it is not an example. This study showed that proverbs have a prominent role in persuasion, argument, statement, education, clarity, approximation, education, refinement, correct belief, etc.

... Show More
View Publication Preview PDF
Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
Recent modification of Homotopy perturbation method for solving system of third order PDEs
...Show More Authors

This paper presents new modification of HPM to solve system of 3 rd order PDEs with initial condition, for finding suitable accurate solutions in a wider domain.

Scopus (18)
Scopus
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Alternative security solutions offered by virtual private network vpn model proposal to use alternatives to Cisco and Microsoft security in al-rasheed bank-delegate general office- northern region
...Show More Authors

The study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.

The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 14 2022
Journal Name
Journal Of The College Of Languages (jcl)
Compound Sentences modification, functions and characteristics from an educational point of view: Umformungen- Funktion- Merkmale unter didaktischen Perspektiven
...Show More Authors
This research deals with compound sentences in the German language and how to transform them and transfer them into a main sentence, touching on their functions and characteristics. Actual to nominative, which is a unique feature of the German language, with some diverse examples taken from various sources.
This case is distinguished, like other grammatical cases
... Show More
View Publication Preview PDF
Publication Date
Fri Aug 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Design a Security Network System against Internet Worms
...Show More Authors

 Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.

View Publication Preview PDF
Publication Date
Thu Dec 31 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
THE PROBLEM OF RANDOMSLAUGHTER IN BAGHDAD AND THE POSSIBILITY OF APPLYING MOBILE SLAGHTERHOUSEES TO REDUCE THEM: THE PROBLEM OF RANDOMSLAUGHTER IN BAGHDAD AND THE POSSIBILITY OF APPLYING MOBILE SLAGHTERHOUSEES TO REDUCE THEM
...Show More Authors

One of the most important elements of achieving food security is livestock, which is an essential element in the agricultural sector, and is one of the state support sectors. Animal production (sheep) ranked an important position in this sector due to the economic advantages that are available when rearing. Moreover, the success and development of sheep breeding depend on several factors, including financial return and achieving profitability. The study aims to identify the phenomenon size of random slaughter as a problem, which spread in Baghdad and its causes and the factors that influencing its development. As well as, the possibility of applying the idea of a​​mobile slaughterhouse to reduce this phenomen

... Show More
View Publication Preview PDF