Preferred Language
Articles
/
fRbmvYoBVTCNdQwCDaS4
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used to encode messages (characters, numbers, and special characters) to binary numbers. Three encoding ideas are proposed for this reason. At the same time, the second step is used Arabic language words to represent the obtained binary sequences to achieve the final secret text. The obtained results exhibited that sending a text containing secret messages in a different language (Arabic) cannot be suspicious when read.

Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Fri Dec 23 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Mitochondrial Copies Number and Some Renal Function Biomarkers in Type 2 Diabetes Mellitus on Metformin
...Show More Authors

One of the most common metabolic illnesses in the world is diabetes mellitus. This metabolic disease is responsible for a large percentage of the burden of kidney damage and dysfunction. The goal of this study was to look into the renal function of diabetic patients using metformin monotherapy who came to Mosul's Al-Wafaa diabetes care and research facility. During the period 1 January 2021 to 30 April 2021, 47 patients with T2DM (age 50.48 7.74 years) were enrolled in this case-control study. These patients' results were compared to a control group of 47 seemingly healthy people (age 45.89 9.06 years). All participants' demographic and medical histories were acquired through the delivery of a questionnaire. Blood samples were collected

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 04 2023
Journal Name
Baghdad Science Journal
Exploration of CPCD number for power graph
...Show More Authors

Recently, complementary perfect corona domination in graphs was introduced. A dominating set S of a graph G is said to be a complementary perfect corona dominating set (CPCD – set) if each vertex in  is either a pendent vertex or a support vertex and  has a perfect matching. The minimum cardinality of a complementary perfect corona dominating set is called the complementary perfect corona domination number and is denoted by . In this paper, our parameter hasbeen discussed for power graphs of path and cycle.

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Oct 25 2023
Journal Name
College Of Islamic Sciences
The good and bad words in Surah Ibrahim, peace be upon him
...Show More Authors

In the name of God, the Most Gracious, the Most Merciful

Praise be to God who revived Balu. And the good word brought hard hearts after removing from them what had almost killed them of ignorance, injustice, hatred, hostility, estrangement, and irritation... So God replaced for them what was best with what was best in terms of knowledge and fairness, and what was corrupt, love, and altruism. So the example of a believer and a good word is like a tree with good roots and branches. Then I pray and greet the one who watered it from the pure and inexhaustible spring of Islam, our Master Muhammad, so that the valleys flowed in their capacity, and the crops grew, then they became thicker and became even, and their good fruits in behavi

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 14 2010
Journal Name
Bayt Alhekma
the problem of the relationship between phraseology and words in modern Russian
...Show More Authors

Abstract The study aimed at reviewing translation theories proposed to address problems in translation studies. To the end, translation theories and their applications were reviewed in different studies with a focus on issues such as critical discourse analysis, cultural specific items and collocation translation.

Publication Date
Thu Jun 30 2022
Journal Name
Journal Of Current Researches On Educational Studies
Study of Swear Words in Selected Literary Works: A Syntactic-Semantic Analysis
...Show More Authors

BN RASHİD, 2022

View Publication
Publication Date
Sun Dec 21 2025
Journal Name
Актуальные проблемы обучения русскому языку Xiii
ARABIC PHONO-GRAMMAR AND ITS RUSSIAN EQUIVALENTS AS A NEW APPROACH IN FL TEACHING (RUSSIAN AND ARABIC IN RUSSIAN AND ARABIC CLASSROOMS)
...Show More Authors

Central and Eastern European Online Library - CEE journals, documents, articles, periodicals, books available online for download, Zeitschrfitendatenbank, Online Zeitschriften, Online Zeitschriftendatenbank

View Publication
Publication Date
Wed Dec 04 2024
Journal Name
المورد
((The effect of mentioning, deleting, or changing the form of some Arabic letters on the meaning of the context of the sentence in Arabic))
...Show More Authors

The letters are exposed in some texts of the classical Arabic language (poetry or prose), or in some of the Qur’anic texts, which are the main sources that were adopted on the day when provisions, rules and linguistic controls were established. I say that some of these letters are exposed in some contexts to deletion, mention, or change in the structure and shape of the letter. As for the omission, it is one of the aspects that distinguished Arabic, as well as other languages, for many purposes that differ among their user.

View Publication Preview PDF
Publication Date
Fri Mar 30 2001
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Arabic Abstracts
...Show More Authors

Abstracts

View Publication Preview PDF