Preferred Language
Articles
/
bsj-2815
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
Shortcomings mentioned by the Torah about the prophet Lot in the prophecies and the respond of Quran
...Show More Authors

Praise be to Allah , and peace and blessings of God sent mercy to the worlds Muhammad
Amin and his family and his friends and followers to the Day of Judgement .
Savants Jews worked to distort the Torah calamity on the Prophet Moses ( peace be upon
him ) to achieve their goals and objectives , which are decorating sin to their followers , and
spreading corruption on earth, through the charge prophets Bmvassad , morality, as the
example and the example that emulate the human in the book of the Lord of the worlds and
their Prophet Lot, described the weak, and cheese, and lack of modesty, and disobedience ,
drinking alcohol , and his failure to raise his two daughters , Jews are corrupt in the ground .
Koran , which

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Modification Of Rheological Properties Of Asphalt Effect Of Addition Of Asphaltenes And Oxidized Asphaltenes On The Compatibility Of Asphalt- Sulfur Blends
...Show More Authors

This study is a complementary one to an extended series of research work that aims to produce a thermodynamiclly stable asphalt –sulfur blend. Asphalt was physically modified wiht different percentages of asphaltenes , oxidized asphaltenes and then mixed with sulfur as an attempt to obtaine a stable compatible asphalt-sulfur blend. The homogeneneity of asphalt-asphaltenes[oxidized asphaltenes]-sulfur blends were studied microscopically and the results are prsented as photomicrographs. Generally more stable and compatible asphalt-sulfur blends were obtained by this treatment.

View Publication Preview PDF
Crossref
Publication Date
Sat Sep 30 2017
Journal Name
College Of Islamic Sciences
Formula ((فُعول ــــ فَعول)) Morphological semantic study In the Holy Quran
...Show More Authors

Linguistic studies present a distinguished place among modern human studies, as we find this clear in the scientific research institutions of the developed nations, it is the main pillar in the strengthening of links and consolidation pillars between individuals and groups. It is a language and between people's thoughts, feelings and actions, and has been able to show that language is not only a tool of expression but is closely linked to the intellectual, emotional and social life of these people individuals and groups.
    The derivation is a major step in Arabic in classifying formulas into weights with special morphological values; these are of great importance in sentences and structures that are the domain of the searc

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 16 2025
Journal Name
International Journal Of Data And Network Science
Multi-objective of wind-driven optimization as feature selection and clustering to enhance text clustering
...Show More Authors

Text Clustering consists of grouping objects of similar categories. The initial centroids influence operation of the system with the potential to become trapped in local optima. The second issue pertains to the impact of a huge number of features on the determination of optimal initial centroids. The problem of dimensionality may be reduced by feature selection. Therefore, Wind Driven Optimization (WDO) was employed as Feature Selection to reduce the unimportant words from the text. In addition, the current study has integrated a novel clustering optimization technique called the WDO (Wasp Swarm Optimization) to effectively determine the most suitable initial centroids. The result showed the new meta-heuristic which is WDO was employed as t

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF
Publication Date
Mon May 02 2022
Journal Name
Lark Journal
Iraq Wars: From A literary text to Social Context
...Show More Authors

This article investigates Iraq wars presentation in literature and media. The first section investigates the case of the returnees from the war and their experience, their trauma and final presentation of that experience. The article also investigates how trauma and fear is depicted to create an optimized image and state of fear that could in turn show Iraqi society as a traumatized society. Critics such as Suzie Grogan believes that the concept of trauma could expand to influence societies rather than one individual after exposure to trauma of being involved in wars and different major conflicts. This is reflected in Iraq as a country that was subjected to six comprehensive conflicts in its recent history, i.e. less than half a century; th

... Show More
Publication Date
Wed Jun 14 2023
Journal Name
Al-academy
The Written Text in Conceptual Art (An Analytical Study)
...Show More Authors

The tagged research problem (the outputs of the written text in conceptual art) dealt with a comparative analytical study in the concept of conceptual art trends (land art - body art - art - language).

The study consisted of four chapters. The first chapter dealt with the theoretical framework, which was represented in presenting (the research problem), which raised the following question: What is the role of the written text in the transformations of the conceptual arts?

The first chapter included (the importance of research) and (research objectives) seeking to conduct comparative research in the written text within the trends of conceptual art as a moving phenomenon in art, and to reveal the variable written text in the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 02 2019
Journal Name
International Journal Of Multidisciplinary And Current Research
The security problem in the Gulf Cooperation Council countries Study on internal challenges and future prospects
...Show More Authors

The importance of our research is that it examines the causes and sources of the security challenges in the internal security environment of the GCC countries, and aims to address the most important issues that are of great interest, namely, the issue of inter-GCC differences and addressing the issues of regional security for the Gulf region, After it is one of the most dynamic and more polarized areas for the emergence of threats and challenges because of the multiplicity of sources of threat and their complexity due to the specificity of the strategic environment and the negative repercussions it can have on the Gulf region, especially the issue of regional security of the Gulf Cooperation Council Which has become a magnet for competing i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 29 2024
Journal Name
Muthanna Journal Of Pure Science
Two-Fold Cryptography: Enhancing Image Security with Henon Map
...Show More Authors

This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.

View Publication Preview PDF
Crossref