Preferred Language
Articles
/
bsj-2815
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 01 2016
Journal Name
Al–bahith Al–a'alami
Semiotics of Senses in the Holy Quran
...Show More Authors

This study is based on the basic idea: that human communication does not stop at the limits of words spoken, but extends to include the movements of the body and its members, such as the face, hand, eye, hearing, touch, taste, sensation and the public body.
The human movements represented by polarization, frowns, tattoos, and movements are all auxiliary tools that reach meanings and affect others greatly.
 Perhaps their importance is also in their ability to translate what is going on in the soul, and to show it to the outside body members, without the control of the human in many cases, it is thus an important factor in the process of human communication.
The purpose of this study is to show the senses of the senses in the

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 30 2006
Journal Name
College Of Islamic Sciences
Secrets of mountains in the Holy Quran
...Show More Authors

Praise be to God, who made the pegs of the earth and entrusted them with the task of keeping the earth from tilting, and prayers and peace be upon the one to whom the Qur’an was revealed, Muhammad, and upon his family and all his companions.

The topic of mountains is one of the important topics in human life, as God has associated great miracles with them that indicate the perfection of the power of God Almighty. God Almighty says: (And to the mountains, my palms have turned. This is worthy of every rational person to contemplate His signs, the Almighty, in this solid part and safety belt of the earth, in order to reveal the secrets of the mountains and uncover their treasures. The more the researcher studies the mountains and

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 19 2013
Journal Name
Journal Of Semitic Studies
An Aramaic Incantation Text
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of The College Of Education For Women
Federated states of monks in the holy Quran (Study and analysis)
...Show More Authors

Thank God also taught us that thanks . thank meets the blessings and rewards mazidk glory we have no knowledge except what you have taught you Alim hakim , not counted praise you as yourself praised and pray and to recognize the envoy mercy to the worlds , prophet Mohammed and his family and companions and guided to the day of judgment .
But after :
Aware of the interpretation of the most important science needed by Muslims because God Almighty sent down the Quraan to be a way of the life for Muslims is subject to a healing for what is in the breasts and it slaham and flaham and has spared the nation from crisisThe stats of the monks , like other verses talking about Christians and Jews and what they have invented in the religion o

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 19 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current

... Show More
Publication Date
Sat Jan 01 2022
Journal Name
Pharmaceutical Sciences Asia
Exploring the role of community pharmacists in preventing the onsite infection during COVID-19 pandemic
...Show More Authors

This study aimed to evaluate the preparedness and adherence of community pharmacists to the International Pharmaceutical Federation (FIP) Health Advisory COVID-19 guidelines for pharmacists (July 2020) during COVID-19 pandemic. This was a cross-sectional study based on electronic survey using google form, which was distributed from November 19, 2020 to January 1, 2021 using social media platforms. The survey measured 21 pharmacy preventive measures (PM). A multivariate regression analysis was used to identify factors influencing pharmacy implementing of PM. Hand disinfection after serving patients represented the main adopted measure (89.3%). Surprisingly, only 35.4% of participants implemented the proper ways of hand disinfection during fa

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Mon Jan 08 2024
Journal Name
Al-academy
Medea Euripides between text and contemporary theatrical presentation
...Show More Authors

It is not available for us to go back in time and see plays old and it plays giants tragedy ancient Greek (Aeschylus, Sofokls, and yourbedes) through the eyes of a generation ago, and if we were able to go back to Ntegathm play it is certain that we will not taste or Nstassig for much of what we see from these offers will not afford the traditional religious rituals, which was accompanied also dance and music in the style of ancient Greek play was representing a large part of the theater see manifestations Can our eyes and ears we twentieth century audience to accept those appearances, and it was then?
Inevitably it will look like a museum bycollection not only. So we find ourselves in the light of the foregoing forced When you do rem

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 30 2016
Journal Name
College Of Islamic Sciences
Community organization and its impact On social security
...Show More Authors

The world went through turmoil before the sixth century AD, and human societies were in conflict and rivalry, each strong state is a weak state-dependent, but the dominant societies made the slave societies to them .. And thus made many societies or civilizations system of classes, and differentiation between members of one community, Weakened its strength and go alone. As the Islamic society in the present weak and weak and falling to the lowest levels of civilizational underdevelopment in the organization of society and social security contrary to what it was Islamic civilization, because of our distance from the heavenly instructions, and this prompted many to walk behind Western ideas aimed at the demolition of Islamic civilization,

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 30 2013
Journal Name
College Of Islamic Sciences
Community organization and its impact on social security
...Show More Authors

Praise be to God, Lord of the worlds, and prayers and peace be upon our master Muhammad and upon his family and companions.
       We see human societies differ from one society to another in organizing social life, and each according to the foundations and rules prepared by the main thing in the welfare and prosperity.
That is why we see eastern societies differ from western societies in many patterns and various ways of reaching that sophistication, until Islam came and gave the proper model in raising society at that time to the best and highest social levels, because it is based on heavenly rules and foundations and not status as in previous civilizations.
And when the Islamic community has

... Show More
View Publication Preview PDF