Preferred Language
Articles
/
bsj-2815
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 20 1930
Journal Name
College Of Islamic Sciences
(Which has been criticized in the Holy Quran
...Show More Authors

Numerical and linguistic methods were varied in interpretation unless they were in accordance with the grammar
Texts of speech, and this was one of the methods used by linguists and linguists as well
What they call them (the opposite is the opposite), and this is what the word "pregnancy"
Is a synonym for the term "interpretation." This term was often used for syntax
The physical and linguistic cause when an act exceeds the character in which it is known to be infringed, or when
The use of a tool with a little use of it, especially by scientists who knew about it
Pay attention to grammatical errors. The Arabs may have uttered the word and wanted to denounce it
He went even further when the eraser carried away his abr

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 30 2008
Journal Name
College Of Islamic Sciences
Qarun In the Holy Quran "": An analytical study
...Show More Authors

For in the Holy Qur’an there are vivid examples and speaking models that tell stories of the tyrants who filled the world with tyranny and overwhelmed it with tyranny, and the Holy Qur’an presents these proverbs to people, not so that they may be amused by them, but rather so that they consider and bite with them. For every tyrannical tyrant, he lives within a framework of self-loss, according to him from life he lives and suffices, even without attachment to a principle or an ideal, and in the world of the unconscious with his whims, without any regard for death that is closer to him than his jugular vein, or for an account that does not leave small or great Therefore, the title of my research came to this (Qarun in the Holy Qur’a

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
The Meanings Mentioned in the Quran - objective study
...Show More Authors

Praise be to God, who has seen uniting the wonders of manufactures, and pronounced Pthamidh oddity Alambdoat, and swam his creation in different languages, Glory is not equal to one in the earth and the heavens, praise Him, and I bear witness that there is no god but Allah alone with no partner certificate towering branches, and I bear witness that Muhammad is His slave and Messenger sent swage Arab government balance, and clearest statement, and the highest residence and Ohllagha words, and Oovaha Zmama, he pointed the way and advised the creation, and the month of Islam, breaking idols, and showed provisions, uncle Balanaam, God separated blessings and peace upon our Prophet Muhammad and the God of the good and virtuous and his compani

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Nasaq
Psychological reasons for suicide in the Holy Quran
...Show More Authors

Praise be to Allah, Lord of the Worlds, and prayers and peace be upon the prophet as a mercy to the worlds and on his family and companions. The phenomenon of suicide is one of the most expanding social phenomena in the world, where many groups of society of different ages try to put an end to their lives, especially young men and girls. The numbers always remain on the rise, and there is no doubt that the one who does this matter, that he has reasons that made him resort to suicide, and despite that, whatever those reasons. However, this is not a justification for the assault on the soul that God has forbidden to infringe on or lead them to perdition, or to what harms them. Modern psychology has tried to explain this phenomenon and try to

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 02 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of nano surface modification on CPTi dental implant using chemical method: mechanical and histological evaluation
...Show More Authors

Background The application of nanotechnology to biomedical surfaces is explained by the ability of cells to interact with nanometric features. The aim of this study was to consider the role of nanoscale topographic modification of CPTi dental implant using chemical etching method for the purpose of improving osseointegration. Materials and methods: Commercial pure titanium rod was machined into 20 dental implants. Each implant was machined in diameter about 3mm, length of 8mm (5mm was threaded part and 3mm was flat part). Implants were prepared and divided into 2 groups according to the types of surface modification method used: 1st group (10 implant) remained without nano surface modification (control), 2nd group include (10 implant) etche

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 06 2017
Journal Name
Al-mustansiriyah Journal Of Science
Modification the ELISA Kit for diagnosis of Psedudomonas aeruginosa and comparing its with ordinary ELSA Kit
...Show More Authors

Publication Date
Thu Dec 01 2011
Journal Name
Iraqi Journal Of Physics
Surface Modification of Ti-6Al-4V Alloy by Glow Discharge-Plasma Nitriding
...Show More Authors

Titanium alloy (Ti-6Al-4V) samples were nitrided in low pressure (1.3, 3 mbar) dc-glow discharge plasmas of nitrogen. The treating time was 5, 10 and 15 hour and the temperatures range of the samples during the nitriding process was close to 800oC. The obtained microstructures of the nitride layers were studied by x-ray diffraction and optical microscopy. The ε –Ti2N, ζ-Ti3N3-x and η-Ti3N2-x.phases were formed and addition to the solid solution of nitrogen in titanium, α (Ti,N). Micro hardness measurements exhibit an increment for the Ti-alloy specimens which nitrided at 800oC for 10 and 15h.Corrosion measurements were obtained for the Ti-6Al-4V alloy in Ringer solution after plasma nitriding. The clear improving in the corrosion r

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today:proceeding
Modification of CR39 surfaces by 193 nm ArF laser for biomaterial sensing
...Show More Authors

Scopus (3)
Scopus
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Theoretical And Applied Information Technology
Graph based text representation for document clustering
...Show More Authors

Advances in digital technology and the World Wide Web has led to the increase of digital documents that are used for various purposes such as publishing and digital library. This phenomenon raises awareness for the requirement of effective techniques that can help during the search and retrieval of text. One of the most needed tasks is clustering, which categorizes documents automatically into meaningful groups. Clustering is an important task in data mining and machine learning. The accuracy of clustering depends tightly on the selection of the text representation method. Traditional methods of text representation model documents as bags of words using term-frequency index document frequency (TFIDF). This method ignores the relationship an

... Show More
Preview PDF
Scopus (15)
Scopus
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More