Preferred Language
Articles
/
bsj-2815
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Investigation of density and form factor of some F isotopes using Hartree-Fock and shell model calculations
...Show More Authors

Structure of unstable 21,23,25,26F nuclei have been investigated
using Hartree – Fock (HF) and shell model calculations. The ground
state proton, neutron and matter density distributions, root mean
square (rms) radii and neutron skin thickness of these isotopes are
studied. Shell model calculations are performed using SDBA
interaction. In HF method the selected effective nuclear interactions,
namely the Skyrme parameterizations SLy4, Skeσ, SkBsk9 and
Skxs25 are used. Also, the elastic electron scattering form factors of
these isotopes are studied. The calculated form factors in HF
calculations show many diffraction minima in contrary to shell
model, which predicts less diffraction minima. The long tail

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
International Journal Of Economics And Finance Studies
THE ROLE OF EXTERNAL INDEBTEDNESS OF THE ECONOMIC AND FINANCIAL DEVELOPMENT IN IRAQ
...Show More Authors

The imperative of achieving financial stability has transcended national boundaries, necessitating heightened attention from both researchers and policymakers. Consequently, this article delves into an examination of the impact of government debt and public debt on financial development within the context of Iraq. The study employs monetary policy, interest rate, inflation, and population growth as control variables to prognosticate financial development. Utilizing data extracted from the World Development Indicators (WDI) spanning the period from 1995 to 2022, the study employs the dynamic autoregressive distributed lag (DARDL) approach to scrutinize the associations under investigation. The findings underscore a negative association betwe

... Show More
Preview PDF
Scopus
Publication Date
Sun Mar 30 2003
Journal Name
College Of Islamic Sciences
Scientific interpretation of the Holy Qur’an and its impact on belief and thought
...Show More Authors

Praise be to God, Lord of the Worlds, and prayers and peace be upon the Master of Messengers, Muhammad and his family

The good and pure and after his companions

God Almighty said: ( ) Do they not contemplate the Qur’an? If it had been from other than God, they would have found in it much discrepancy. God Almighty has made the well-being of people and their lives linked to faith in it. So what is the need of people today to return to the Book of their Lord so that they may return to the right path that God intended for His servants so that they may attain sustenance? Security and the good life. How could it not be, when many of the nations of the world no longer see security or stability because their leaders and politic

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 04 2018
Journal Name
Baghdad Science Journal
Structural Analysis of Chemical and Green Synthesis of CuO Nanoparticles and their Effect on Biofilm Formation
...Show More Authors

Copper oxide nanoparticles (CuO NPs) were synthesized by two methods. The first was chemical method by using copper nitrate Cu (NO3)2 and NaOH, while the second was green method by using Eucalyptus camaldulensis leaves extract and Cu (NO3)2. These methods easily give a large scale production of CuO nanoparticles. X-ray diffraction pattern (XRD) reveals single phase monoclinic structure. The average crystalline size of CuO NPs was measured and used by Scherrer equation which found 44.06nm from chemical method, while the average crystalline size was found from green method was 27.2nm. The morphology analysis using atomic force microscopy showed that the grain size for CuO NPs was synthesized by chemical and green methods were 77.70 and 89.24

... Show More
View Publication Preview PDF
Scopus (38)
Crossref (25)
Scopus Clarivate Crossref
Publication Date
Mon Apr 08 2013
Journal Name
Chemistry And Materials Research
Synthesis, spectral and antimicrobial activity of mixed ligand complexes of Co(II), Ni(II), Cu(II) and Zn(II) with Anthranillic Acid and Tributylphosphine
...Show More Authors

Mixed ligand complexes of bivalent metal ions, viz; Co(II), Ni(II), Cu(II) and Zn(II) of the composition [M(A)2((PBu3)2]in(1:2:2)(M:A:(PBu3). molar ratio, (where A- Anthranilate ion ,(PBu3)= tributylphosphine. M= Co(II),Ni(II),Cu(II) and Zn(II). The prepared complexes were characterized using flame atomic absorption, by FT-IR, UV/visible spectra methods as well as magnetic susceptibility and conductivity measurements. The metal complexes were tested in vitro against three types of pathogenic bacteria microorganisms: (Staphylococcus, Klebsiella SPP .and Bacillas)to assess their antimicrobial properties. Results. The study shows that all complexes have octahedral geometry; in addition, it has high activity against tested bacteria. Based on th

... Show More
Publication Date
Sat Mar 30 2013
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Preparation and Formation of Zeolite 5A from Local Kaolin Clay for Drying and Desuphurization of Liquefied Petroleum Gas
...Show More Authors

This work deals with preparation of zeolite 5A from Dewekhala kaolin clay in Al-Anbar region for drying and desulphurization of liquefied petroleum gas. The preparation of zeolite 5A includes treating kaolin clay with dilute hydrochloric acid 1N, treating metakaolin with NaOH solution to prepare 4A zeolite, ion exchange, and formation. For preparation of zeolite 4A, metakaolin treated at different temperatures (40, 60, 80, 90, and 100 °C) with different concentrations of sodium hydroxide solution (1, 2, 3, and 4 N) for 2 hours. The zeolite samples give the best relative crystallinity of zeolite prepared at 80 °C with NaOH concentration 3N (199%), and at 90 and 100°C with NaOH concentration solution 2N (184% and 189%, respectively). Ze

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 30 2023
Journal Name
College Of Islamic Sciences
The provisions of voluntary charity and some of its contemporary applications
...Show More Authors

Summary of the research in English:

the research seeks to define the provisions of voluntary charity and some of its contemporary applications, so the research is after the definition of charity and voluntary charity, define the provisions of the Most important thing charity, where the one who is given charity, in the introduction, he talked about the importance of charity in social solidarity,As for the first topic ,it deait with a statement and definition of charity in the Quran,sunnah and comparative juris prudence,whil the second topic was conducted with clarifying the provisions of the ratified, the ratified,while the third topic was concerned with clarifying the application of voluntary charity contemporary investing the Mo

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 01 2016
Journal Name
Journal Of Engineering
Analytical and Numerical Tooth Contact Analysis (TCA) of Standard and Modified Involute Profile Spur Gear
...Show More Authors

Among all the common mechanical transmission elements, gears still playing the most dominant role especially in the heavy duty works offering extraordinary performance under extreme conditions and that the cause behind the extensive researches concentrating on the enhancement of its durability to do its job as well as possible. Contact stress distribution within the teeth domain is considered as one of the most effective parameters characterizing gear life, performance, efficiency, and application so that it has been well sought for formal gear profiles and paid a lot of attention for moderate tooth shapes. The aim of this work is to investigate the effect of pressure angle, speed ratio, and correction factor on the maxi

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Synthesis and Characterization of New Mesomorphic Azo Compounds and Study their Photoluminesecence Properties
...Show More Authors

The preparation of a new Azo compounds of highly conjugated dimeric and polymeric liquid crystal to achieve the crystalline characteristics Which have structures assigned based on elemental analysis, IR 1HNMR and CHNS-O while mesogenic properties have been set for DSC and hot-stage polarizing optical microscopy. The compounds show enantiotropicnematic phase being displayed. The compounds show photoluminescence properties in the organic solution at room temperature, with the fluorescence band centered around 400 nm.

View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref