Preferred Language
Articles
/
bsj-2815
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Sun Jan 04 2015
Journal Name
Journal Of Educational And Psychological Researches
The concept of physical, psychological and social self with the kindergartens
...Show More Authors

The concept of self is considered one of the important dimensions in the human personality, because feeling of self is an important characteristic in this phase from the psychological point of view.

The first source which forms the concept of self is the physical image, where the built and appearance of the body is considered among the vital matters which determine the person's image of himself/herself. 

The current research aims to:

1) Identify the level of physical self concept at the kindergarten children.

2) Identify the level of psychological self concept at the kindergarten children.

3) Iden

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 07 2016
Journal Name
International Journal Of Innovative Research In Science, Engineering And Technology
Effect Of thickness On The Structure And Electrical Conductivity Properties Of CuInSe2 Thin Films
...Show More Authors

The influence of different thickness (500,750, and 1000) nm on the structure properties electrical conductivity and hall effect measurements have been investigated on the films of copper indium selenide CuInSe2 (CIS) the films were prepared by thermal evaporation technique on glass substrates at RT from compound alloy. The XRD pattern show that the film have poly crystalline structure a, the grain size increasing with as a function the thickness. Electrical conductivity (σ), the activation energies (Ea1,Ea2), hall mobility and the carrier concentration are investigated as function of thickness. All films contain two types of transport mechanisms of free carriers increase films thickness. The electrical conductivity increase with thickness

... Show More
Preview PDF
Publication Date
Sun Dec 06 2009
Journal Name
Baghdad Science Journal
Some Results of Feebly Open and Feebly Closed Mappings
...Show More Authors

The main purpose of this paper is to study feebly open and feebly closed mappings and we proved several results about that by using some concepts of topological feebly open and feebly closed sets , semi open (- closed ) set , gs-(sg-) closed set and composition of mappings.

View Publication Preview PDF
Crossref
Publication Date
Wed Dec 15 2021
Journal Name
Journal Of Baghdad College Of Dentistry
Odontogenic Cysts and Tumors of Maxilla and Maxillary Sinus (A Clinicopathological Analysis)
...Show More Authors

Background: Knowledge about the prevalence and distribution of pathologies in a particular location is important when a differential diagnosis is being formulated. The aim of this study was to describe the prevalence and the clinicopathological features of odontogenic cysts and tumors affecting the maxilla and to discuss the unusual presentation of those lesions within maxillary sinus.

Materials and Methods: A multicenter retrospective analysis was performed on pathology archives of patients who were diagnosed with maxillary odontogenic cysts and tumors from 2010 to 2020. Data were collected with respect to age, gender and location.

Result: A total of 384 cases was identified, 320 (83.3%) cases were diagnosed as odontogenic

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Preparation and Evaluation of PolyVinyl Alcohol Derivative as Antimicrobial and Antifungal Agents
...Show More Authors

Polyvinal alcohol was Cynoethylated , complex compound with Iodin in presence of Cu++ ions were preparated and their ultra violet (U.V) and infra red( IR) spectra were investigated. The prepared derivative and complexes were evaluated as antibacterial and antifungal agents following the standard dilution method. MIC(minimum inhibitory concentration) for each polymer using ten types of gram + ve and gram _ ve bacteria were determinated in addition to three types of fungi. The results obtainded showed that MIC, s were around 0.0011 × 103 molar for different polymetric derivatives tried.

View Publication Preview PDF
Crossref
Publication Date
Wed Nov 04 2015
Journal Name
Eng. &tech. Journal
Photoconductivity and Performance of Mn2+ and Ce3+ Doped ZnS Quantum Dot Detectors
...Show More Authors

Mn2+ and Ce3+ Doped ZnS nanocrystals were prepared by a simple microwave irradiation method under mild condition. The starting materials for the synthesis of Mn2+ and Ce3+ Doped ZnS P nanocrystals were zinc acetate as zinc source, thioacetamide as a sulfur source, manganese chloride and Cerium chloride as manganese and cerium sources respectively (R & M Chemical) and ethylene glycol as a solvent. All chemicals were analytical grade products and used without further purification. The nanocrystals of Mn2+ and Ce3+ Doped ZnS P with cubic structure were characterized by X-ray powder diffraction (XRD), the morphology of the film is seen by field effect scanning electron microscopy (FESEM). The composition of the samples is analyzed by EDS. The s

... Show More
Publication Date
Sun Aug 04 2024
Journal Name
International Journal Of Home Science
The phenomenon of drugs in Iraq and its international and national impacts
...Show More Authors

Abstract Drug addiction is considered a criminal behavior, which led the Iraqi legislator to prohibit and criminalize it, imposing penalties on those who use or even approach it. This aims to limit its presence in Iraq and reduce unethical behaviors, leveraging the divine prohibition to curb it. The legislator also encourages media organizations to raise awareness about the dangers of this substance, which has contributed to reducing the phenomenon of drugs in Iraq.

Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Eurasian Chemical Communications
Characterization and synthesis of some new Schiff bases and their potential applications
...Show More Authors

In this present work, [4,4`-(biphenyl-4,4`-diylbis(azan-1-yl-1-ylidene))bis(methan-1-yl-1-ylidene)bis(2-methoxyphenl)(A1),4,4`-(biphenyl-4,4`-diylbis(azan-1-yl-1-ylidene))bis(methan-1-yl-1-ylidene)diphenol(A2),1,1`-(biphenyl-4,4`-diylbis(azan-1-yl-1-ylidene))bis(methan-1-yl-1-ylidene) dinaphthalen-2-ol (A3)]C.S was prepared in 3.5% NaCl. Corrosion prevention at (293-323) K has been studied by using electrochemical measurements. It shows that the utilized inhibitors are of mixed type based on the polarization curves. The results indicated that the inhibition efficiency changes were used with a change according to the functional groups on the benzene ring and through the electrochemical technique. Temperature increases with corrosion current

... Show More
View Publication Preview PDF
Scopus (7)
Scopus Clarivate
Publication Date
Thu Sep 22 2016
Journal Name
Applied Sciences
Analysis and Evaluation of Performance Gains and Tradeoffs for Massive MIMO Systems
...Show More Authors

View Publication
Scopus (16)
Crossref (15)
Scopus Clarivate Crossref