Preferred Language
Articles
/
bsj-2815
Applying Quran Security and Hamming CodesFor Preventing of Text Modification

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Steganography Based on Wavelet Transform and Histogram Modification

      Recently, digital communication has become a critical necessity and so the Internet has become the most used medium and most efficient for digital communication. At the same time, data transmitted through the Internet are becoming more vulnerable. Therefore, the issue of maintaining secrecy of data is very important, especially if the data is personal or confidential. Steganography has provided a reliable method for solving such problems. Steganography is an effective technique in secret communication in digital worlds where data sharing and transfer is increasing through the Internet, emails and other ways. The main challenges of steganography methods are the undetectability and the imperceptibility of con

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sat Aug 20 2022
Journal Name
Journal Of Legal Sciences
Autonomous state security

The state, as one of the most important social institutions that works to provide services and security for individuals, needs security, and this security is achieved according to a specific hierarchy that starts from the security of the individual and the security of society to the security of the state, as the advanced state security is based on the basic pillars of solidarity and social peace This security consists of several levels (human, regional, social, economic, and cyber), unlike Arab criminal legislation, including Iraqi law, which is based on the concept of traditional state security, as it relies on the military side only in order to provide maximum criminal protection for the security of the political system The security of

... Show More
Crossref
View Publication Preview PDF
Publication Date
Fri Apr 02 2021
Journal Name
Review Of International Geographical Education
Energy Security and Energy Transition in Germany

Energy is one of the components of the national security of countries and is of particular importance to the industrialized countries, including Germany. Energy policy includes many areas and has an impact on various sectors such as the environment, climate, agriculture and others. During the past few years, Germany has witnessed many transformations, the most important of which is the energy transition towards renewable energy, and it was strengthened in the strategy that was It was developed in 2010, which aims to achieve a long-term energy transformation, and sales of the German energy technology sector have evolved from 2010 to 2020, and this issue is related on the other hand to the concept of energy security and because of its strateg

... Show More
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
edge detection using modification prewitt operators

in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators

Crossref
View Publication Preview PDF
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding Techniques for Dynamic Encryption Text based on Corner Point

Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

Scopus (10)
Crossref (2)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Sat Jun 03 2023
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn: 2789-3219 )
Analyzing the Potential Antioxidative Effects of Omega-369 in Preventing Acetaminophen-Induced Liver Damage

Background: As acetaminophen (APAP) toxicity has become more common in many countries, related cases of poisoning, whether deliberate or unintentional, have been identified as a key contributor to acute liver failure. Aime: To discover if omega-369 fatty acids could protect the liver of male mice from the effects of acetamiophen. Methods: Thirty-five albino male mice were allocated to one of five groups at random. Group 1 served as the "negative control" and received a single intraperitoneal injection (10 ml/kg) of normal saline on the eleventh day of the test following ten days of receiving liquid paraffin orally at a dose of 10 ml/kg. The liquid paraffin was given to group 2 "positive control". Group 3 received Omega 369 (50 mg/kg

... Show More
Scopus (1)
Crossref (1)
Scopus Crossref
View Publication
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Educational And Psychological Researches
Slums and its implication on security in Baghdad

The research team seeks to study the phenomena of random housing in Iraqi society in general and Baghdad city in particular by standing on the causes behind this phenomena and its relation with security situation in Baghdad. The researchers adopted a theoretical and practical framework. The main objective is to diagnose the risks caused by the escalation of slums in Baghdad city. 

View Publication Preview PDF
Publication Date
Fri Mar 01 2024
Journal Name
Al-khwarizmi Engineering Journal
Modification, Characterization of Tea Residue-derived Activated Carbon, and Ciprofloxacin Adsorption

تقدم هذه الدراسة وصفا للطريقة المستخدمة في تحضير الكربون المنشط  (AC)من بقايا الشاي. تم دراسة الخواص الفيزيائية والكيميائية وكفاءة الامتزاز للكربون المنشط المحضر. تم إنتاج الكربون المنشط (AC) على مرحلتين: الاولى التنشيط باستخدام حامض الفوسفوريك (H3PO4) والثانية الكربنة عند درجة حرارة 450 درجة مئوية. استخدم الكربون المنشط لغرض امتصاص العقار الدوائي السيبروفلوكساسين(CIP) . تمت  دراسة عدة عوامل تشغيلية  بدرجة حرار

... Show More
Crossref
View Publication
Publication Date
Fri Mar 01 2024
Journal Name
Al-khwarizmi Engineering Journal
Modification, Characterization of Tea Residue-derived Activated Carbon, and Ciprofloxacin Adsorption

تقدم هذه الدراسة وصفا للطريقة المستخدمة في تحضير الكربون المنشط  (AC)من بقايا الشاي. تم دراسة الخواص الفيزيائية والكيميائية وكفاءة الامتزاز للكربون المنشط المحضر. تم إنتاج الكربون المنشط (AC) على مرحلتين: الاولى التنشيط باستخدام حامض الفوسفوريك (H3PO4) والثانية الكربنة عند درجة حرارة 450 درجة مئوية. استخدم الكربون المنشط لغرض امتصاص العقار الدوائي السيبروفلوكساسين(CIP) . تمت  دراسة عدة عوامل تشغيلية  بدرجة حرار

... Show More
Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi Journal Of Science
Synthesis, Modification and Characterization of New Phenolic Resins linked to Tetrabromophthalimide

     The present work aimed to synthesize new phenol resins via incorporation of structural modification through introducing new phenolic compounds containing cyclic imide moiety in reaction with formaldehyde. The synthesis of these new resins involved three steps. First, one of the three N-(hydroxyphenyl)tetrabromophtalamic acids 1-3 were processed via a reaction between tetrabromophthalic anhydride and aminophenols. Amic acids 1-3 were dehydrated in the second step by smelting, producing the identical N-(hydroxyphenyl)tetrabromophthalimides 4-6. The new imides represent the new phenolic component

... Show More
Scopus Crossref
View Publication Preview PDF