Preferred Language
Articles
/
bsj-2815
Applying Quran Security and Hamming CodesFor Preventing of Text Modification

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Nov 20 2024
Journal Name
Technical University Of Munich
Conditions for Applying Public Private Partnership PPP in Iraq Infrastructure Projects Successfully

Public private partnership PPP is a method to procure public projects in order to achieve additional value for money in terms of efficiency and quality of services. This thesis studies the concepts of PPP, advantages and disadvantages of PPP. In addition, current Iraq infrastructure projects situations and needs, as well as, some aspects relating to the Iraq’s construction market, legal and contract systems were discussed. A financial model was carried out and applied to a real-life case study project. Finally, a survey targeted researchers; public and private- sectors were applied.

View Publication
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
A Genetic Based Optimization Model for Extractive Multi-Document Text Summarization

Extractive multi-document text summarization – a summarization with the aim of removing redundant information in a document collection while preserving its salient sentences – has recently enjoyed a large interest in proposing automatic models. This paper proposes an extractive multi-document text summarization model based on genetic algorithm (GA). First, the problem is modeled as a discrete optimization problem and a specific fitness function is designed to effectively cope with the proposed model. Then, a binary-encoded representation together with a heuristic mutation and a local repair operators are proposed to characterize the adopted GA. Experiments are applied to ten topics from Document Understanding Conference DUC2002 datas

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
Shortcomings mentioned by the Torah about the prophet Lot in the prophecies and the respond of Quran

Praise be to Allah , and peace and blessings of God sent mercy to the worlds Muhammad
Amin and his family and his friends and followers to the Day of Judgement .
Savants Jews worked to distort the Torah calamity on the Prophet Moses ( peace be upon
him ) to achieve their goals and objectives , which are decorating sin to their followers , and
spreading corruption on earth, through the charge prophets Bmvassad , morality, as the
example and the example that emulate the human in the book of the Lord of the worlds and
their Prophet Lot, described the weak, and cheese, and lack of modesty, and disobedience ,
drinking alcohol , and his failure to raise his two daughters , Jews are corrupt in the ground .
Koran , which

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Modification Of Rheological Properties Of Asphalt Effect Of Addition Of Asphaltenes And Oxidized Asphaltenes On The Compatibility Of Asphalt- Sulfur Blends

This study is a complementary one to an extended series of research work that aims to produce a thermodynamiclly stable asphalt –sulfur blend. Asphalt was physically modified wiht different percentages of asphaltenes , oxidized asphaltenes and then mixed with sulfur as an attempt to obtaine a stable compatible asphalt-sulfur blend. The homogeneneity of asphalt-asphaltenes[oxidized asphaltenes]-sulfur blends were studied microscopically and the results are prsented as photomicrographs. Generally more stable and compatible asphalt-sulfur blends were obtained by this treatment.

Crossref
View Publication Preview PDF
Publication Date
Wed Nov 20 2024
Journal Name
International Journal Of Data And Network Science
Multi-objective of wind-driven optimization as feature selection and clustering to enhance text clustering

Text Clustering consists of grouping objects of similar categories. The initial centroids influence operation of the system with the potential to become trapped in local optima. The second issue pertains to the impact of a huge number of features on the determination of optimal initial centroids. The problem of dimensionality may be reduced by feature selection. Therefore, Wind Driven Optimization (WDO) was employed as Feature Selection to reduce the unimportant words from the text. In addition, the current study has integrated a novel clustering optimization technique called the WDO (Wasp Swarm Optimization) to effectively determine the most suitable initial centroids. The result showed the new meta-heuristic which is WDO was employed as t

... Show More
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sat Sep 30 2017
Journal Name
College Of Islamic Sciences
Formula ((فُعول ــــ فَعول)) Morphological semantic study In the Holy Quran

Linguistic studies present a distinguished place among modern human studies, as we find this clear in the scientific research institutions of the developed nations, it is the main pillar in the strengthening of links and consolidation pillars between individuals and groups. It is a language and between people's thoughts, feelings and actions, and has been able to show that language is not only a tool of expression but is closely linked to the intellectual, emotional and social life of these people individuals and groups.
    The derivation is a major step in Arabic in classifying formulas into weights with special morphological values; these are of great importance in sentences and structures that are the domain of the searc

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 24 2023
Journal Name
Materials Research Innovations
Scopus Crossref
View Publication
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 14 2023
Journal Name
Al-academy
The Written Text in Conceptual Art (An Analytical Study)

The tagged research problem (the outputs of the written text in conceptual art) dealt with a comparative analytical study in the concept of conceptual art trends (land art - body art - art - language).

The study consisted of four chapters. The first chapter dealt with the theoretical framework, which was represented in presenting (the research problem), which raised the following question: What is the role of the written text in the transformations of the conceptual arts?

The first chapter included (the importance of research) and (research objectives) seeking to conduct comparative research in the written text within the trends of conceptual art as a moving phenomenon in art, and to reveal the variable written text in the

... Show More
Crossref
View Publication Preview PDF