Preferred Language
Articles
/
bsj-2815
Applying Quran Security and Hamming CodesFor Preventing of Text Modification

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
Integrative Relationship between the Picture and the Written Text in the Commercial Advertisement

There is no doubt that the   advertisement picture  and the written text play  a key role in the formation of the language of the communicative discourse as the main pillars of the design of commercial advertising and the main entrance for the  advertising message awareness... Hence the researcher chose the title of her research (Integrative Relationship between the Picture and the Written Text in the Printed Commercial Advertisement) starting from following questions: What is the relationship between the picture and the written text in the printed commercial declaration? Is there functional, aesthetic and interactive integration between them?

          &n

... Show More
Crossref
View Publication Preview PDF
Publication Date
Mon Mar 25 2019
Journal Name
Al-academy
Controversy between Mask and Text in the Literary Books Covers Design: عبدالحسين عبدالواحد

The reciprocal relationship between the text and the mask in the printed product is one of the most important relationships that frame the level of communication between the appearance and the interior, although it is not cared for by some designers and publishing institutions. Therefore, the problem of research is determined by the following question (What is the dialectical relationship between the text and the mask in the literary books covers design?). The research aims to shed light on this problematic relationship at the level of reception and aesthetics at the same moment. The theoretical framework included two sections: the first (mask and text ... the concept and the mutual relationship), while the second section (trends in the

... Show More
Crossref
View Publication Preview PDF
Publication Date
Wed Sep 29 2021
Journal Name
College Of Islamic Sciences
Methodology of the Holy Quran Immunizing the minds of intellectuals against intellectual invasion

 

Abstract

              

The Holy Quran is the greatest motivator for the mind to keep pace with life. The doctrine of faith is a requirement of logic and wisdom, and it cannot be reached by the hand of superstition. The Qur’an destroyed the principle of superstition in the verses of the creation of the universe. The principle of inactivity of the Qur’an is a false accusation that collision with the texts of the Qur’an. The secret of scientific development is to harness the laws of nature, benefit from them, and walk according to its requirements, on which the manifestations of civilization and the Qur’an are based

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Engineering
Using a New Modification on Wind Turbine Ventilator for Improving Indoor Air Quality

This paper describes a newly modified wind turbine ventilator that can achieve highly efficient ventilation. The new modification on the conventional wind turbine ventilator system may be achieved by adding a Savonius wind turbine above the conventional turbine to make it work more efficiently and help spinning faster. Three models of the Savonius wind turbine with 2, 3, and 4 blades' semicircular arcs are proposed to be placed above the conventional turbine of wind ventilator to build a hybrid ventilation turbine. A prototype of room model has been constructed and the hybrid turbine is placed on the head of the room roof. Performance's tests for the hybrid turbine with a different number of blades and different values o

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
Enhancing national security through foreseeing the economic intelligence system in Iraq

 

         Economic intelligence represents a modern field of knowledge that has been and is still the focus of many studies and research, including this research that deals with economic intelligence and its role in strengthening Iraqi national security - an analytical study. Economic development and economic development without security, and in a situation such as that of Iraq, which is still suffering from conflicts, conflicts and the effects of wars, as well as the unstable conditions in its regional environment, the directions of that relationship cannot be determined except through the availability of accurate information, indicators, full knowledge of reality and the pos

... Show More
Crossref
View Publication Preview PDF
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
A Review of Assured Data Deletion Security Techniques in Cloud Storage

      Cloud computing is an interesting technology that allows customers to have convenient, on-demand network connectivity based on their needs with minimal maintenance and contact between cloud providers. The issue of security has arisen as a serious concern, particularly in the case of cloud computing, where data is stored and accessible via the Internet from a third-party storage system. It is critical to ensure that data is only accessible to the appropriate individuals and that it is not stored in third-party locations. Because third-party services frequently make backup copies of uploaded data for security reasons, removing the data the owner submits does not guarantee the removal of the data from the cloud. Cloud data storag

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Oct 07 2012
Journal Name
Journal Of Educational And Psychological Researches
The Role of School in Promoting Intellectual Security of Students in Qurayyat Governorate

The current study aimed to reveal the role of the high school (boys) in the Governorate of Qurayyat (KSA) in promoting intellectual security of students, and whether there were differences in the estimates of the study sample due to the variables; the current position, academic qualification, teaching specialization and years of experience. This study was conducted by applying the analytical descriptive method, and used questionnaire as a tool for data collection. The survey consisted of (44) ite

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 20 2024
Journal Name
Journal Of Juridical And Political Science
Criminal protection of the internal state security in light of the fourth generation wars

The research deals with a very important topic, which is social security viewed in the context of criminal protection for state security and the challenges it faces after a decisive change in the methods of war. The research also presents a different division of the generations of wars. We limit ourselves to four of them based on the change in the strategic war objectives and not just the means of committing them. This is because these means are not suitable for describing the real changes in the patterns of wars and the goals that it seeks to achieve. The research stresses the importance of putting the concept of state security in its correct framework, which is part of social security, so that the interest of the political system and the

... Show More
View Publication
Publication Date
Wed Dec 14 2022
Journal Name
Nasaq Journal
View Publication
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Aware of the roots of the text in the arab heritage

Text science presented a set of criteria to make the text essentially a project to create
texts and use. Me and means of cohesion script text scientists, two standard foundries and
knitting. Find this means their equivalent in the Arab rhetorical Heritage has been found, it
means foundries find Accompanying represented (link grammar in the classroom and link),
and referrals represented by (Baldmair, Ldefinition, and the name of the signal), and
deletion, and repetition, and presentation delays. As in the standard knitting it has confirmed
Albulagjun Arabs on the semantic consistency between the text components, as reflected in
the moral link in Chapter interfaces, as well as in moral coherence between parts of the te

... Show More
View Publication Preview PDF