Preferred Language
Articles
/
bsj-2815
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
The Meanings Mentioned in the Quran - objective study
...Show More Authors

Praise be to God, who has seen uniting the wonders of manufactures, and pronounced Pthamidh oddity Alambdoat, and swam his creation in different languages, Glory is not equal to one in the earth and the heavens, praise Him, and I bear witness that there is no god but Allah alone with no partner certificate towering branches, and I bear witness that Muhammad is His slave and Messenger sent swage Arab government balance, and clearest statement, and the highest residence and Ohllagha words, and Oovaha Zmama, he pointed the way and advised the creation, and the month of Islam, breaking idols, and showed provisions, uncle Balanaam, God separated blessings and peace upon our Prophet Muhammad and the God of the good and virtuous and his compani

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 30 2008
Journal Name
College Of Islamic Sciences
Qarun In the Holy Quran "": An analytical study
...Show More Authors

For in the Holy Qur’an there are vivid examples and speaking models that tell stories of the tyrants who filled the world with tyranny and overwhelmed it with tyranny, and the Holy Qur’an presents these proverbs to people, not so that they may be amused by them, but rather so that they consider and bite with them. For every tyrannical tyrant, he lives within a framework of self-loss, according to him from life he lives and suffices, even without attachment to a principle or an ideal, and in the world of the unconscious with his whims, without any regard for death that is closer to him than his jugular vein, or for an account that does not leave small or great Therefore, the title of my research came to this (Qarun in the Holy Qur’a

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 20 1930
Journal Name
College Of Islamic Sciences
(Which has been criticized in the Holy Quran
...Show More Authors

Numerical and linguistic methods were varied in interpretation unless they were in accordance with the grammar
Texts of speech, and this was one of the methods used by linguists and linguists as well
What they call them (the opposite is the opposite), and this is what the word "pregnancy"
Is a synonym for the term "interpretation." This term was often used for syntax
The physical and linguistic cause when an act exceeds the character in which it is known to be infringed, or when
The use of a tool with a little use of it, especially by scientists who knew about it
Pay attention to grammatical errors. The Arabs may have uttered the word and wanted to denounce it
He went even further when the eraser carried away his abr

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Tue Feb 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Relationship's Impact Between the External and Internal Auditor in Preventing the Administrative & Financial Corruption: Applied Research in Sample Entities
...Show More Authors

    This research discusses one of the most important means of reducing corruption in public sector companies and government departments, a relationship of cooperation and coordination between the external auditor and internal auditor, in the light of ISA (610), the recommendations of the International Organization of Supreme Audit Institutions (INTOSAI) and the National Strategy to combat corruption. The research was based on two assumptions: the first was weak relationship of cooperation and coordination between the external auditor and internal auditor leads to weakne

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
Recent modification of Homotopy perturbation method for solving system of third order PDEs
...Show More Authors

This paper presents new modification of HPM to solve system of 3 rd order PDEs with initial condition, for finding suitable accurate solutions in a wider domain.

Scopus (19)
Scopus
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Educational And Psychological Researches
Measuring university teachers attitudes towards the security man
...Show More Authors

Measuring university teachers attitudes towards the security man Summary This research aims to study the measurement of university teachers attitudes towards the security man, and represented the research sample (196) of teachers, including 124 males and 72 females from different faculties of Salah al-Din - Erbil University. The researchers adopted on a scale (Al-Tarawneh 2008), as amended, and its development, the scale consists of four areas and (28) paragraph covers paragraphs measure the beliefs and feelings of the individual towards the security man as the theme of direction. The research sample answered all the paragraphs of the scale grade five similar styles (Likert) (strongly OK, OK, neutral, non-OK, Strongly Disagree). The rese

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 14 2022
Journal Name
Journal Of The College Of Languages (jcl)
Compound Sentences modification, functions and characteristics from an educational point of view: Umformungen- Funktion- Merkmale unter didaktischen Perspektiven
...Show More Authors
This research deals with compound sentences in the German language and how to transform them and transfer them into a main sentence, touching on their functions and characteristics. Actual to nominative, which is a unique feature of the German language, with some diverse examples taken from various sources.
This case is distinguished, like other grammatical cases
... Show More
View Publication Preview PDF
Publication Date
Sun Feb 15 2026
Journal Name
Universum: общественные науки
POLITICAL ENVIRONMENT AND HYDROLOGICAL DECLINE: IRAQ’S WATER SECURITY TRANSFORMATION BEFORE AND AFTER 2003
...Show More Authors

Iraq's water crisis represents one of the most pressing environmental and socioeconomic challenges facing the country today. This study examines the evolution of water resource problems in Iraq through a comprehensive historical comparison between the pre-2003 period under Saddam Hussein's regime and the post-2003 era following the U.S.-led invasion and subsequent political transformation. The research employs a mixed-method approach, analyzing quantitative data on water flow rates, infrastructure development, and qualitative assessments of policy impacts across both periods. Key findings reveal that while the pre-2003 period was characterized by deliberate environmental destruction, particularly the draining of the Mesopotamian Marshes, an

... Show More
View Publication Preview PDF