Preferred Language
Articles
/
EBYb9osBVTCNdQwCqueV
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circular queue in this work allows to encrypt each character of plaintext by one of cipher methods which controlled by control key for selection process. The scheduling of above cipher methods implementation depends on control key. The experiment results of the proposed hybrid text cryptography method shows ability to cipher and decipher an important data with effectively and efficiently. Utilizing the properties of different cipher methods that are scheduled in circular queue (Caesar, Vigenère, Affine, and Multiplicative) leads to consume time less than other methods when they used alone, so, the important concepts in cryptography process such as complexity, integrity, execution time and security are meet in the proposed hybrid text cryptography method in ef ective manner.

Publication Date
Tue Oct 05 2010
Journal Name
Journal Of College Of Education For Women
Conversation Analysis of Forum: a Selected Text from Paul S. Kemp Online Journal
...Show More Authors

Language as a means of communication has long been the concern of many conversation analysts in their studies such as: Sacks et al. (1974), Schegloff et al. (1977), Duncan (1972), Grice (1975) and Burton (1980). Burton has attempted analyzing the first ten transitions of the play “The Dumb Waiter” for mere a presentation of her approach. This paper aims at analyzing the conversational structure of forum on the subject of literary fiction and genre fiction by applying Burton’s model (1980) of analysis to answer the question to what extent this model is applicable in analyzing the presented text. The findings of the investigation have proved the applicability of the structure of conversation formulated by Burton (1980) in her model wit

... Show More
Preview PDF
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
Schema Theory and Text- worlds: A Cognitive Stylistic Analysis of Selected Literary Texts
...Show More Authors

Cognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections.       

Schema and text world theories are useful tools in cognitive stylistic stud

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (3)
Scopus Crossref
Publication Date
Wed Dec 27 2017
Journal Name
Al-khwarizmi Engineering Journal
The Effect of Restriction Shape On Laminar Natural Convection Heat Transfer In A Vertical Circular Tube
...Show More Authors

Natural convection heat transfer is experimentally investigated for laminar air flow in a vertical circular tube by using the boundary condition of constant wall heat flux in the ranges of (RaL) from (1.1*109) to (4.7*109). The experimental set-up was designed for determining the effect of different types of restrictions placed at entry of heated tube in bottom position, on the surface temperature distribution and on the local and average heat transfer coefficients. The apparatus was made with an electrically heated cylinder of a length (900mm) and diameter (30mm). The entry restrictions were included a circular tube of same diameter as the heated cylinder but with lengths of (60cm, 120cm), sharp-edge and

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2008
Journal Name
Baghdad Science Journal
Tamper Detection in Text Document
...Show More Authors

Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 30 2013
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Permeability Prediction of Un-Cored Intervals Using FZI Method and Matrix Density Grouping Method: A Case Study of Abughirab Field/Asmari FM., Iraq
...Show More Authors

Knowledge of permeability is critical for developing an effective reservoir description. Permeability data may be calculated from well tests, cores and logs. Normally, using well log data to derive estimates of permeability is the lowest cost method. This paper will focus on the evaluation of formation permeability in un-cored intervals for Abughirab field/Asmari reservoir in Iraq from core and well log data. Hydraulic flow unit (HFU) concept is strongly related to the flow zone indicator (FZI) which is a function of the reservoir quality index (RQI). Both measures are based on porosity and permeability of cores. It is assumed that samples with similar FZI values belong to the same HFU. A generated method is also used to calculate permea

... Show More
View Publication Preview PDF
Publication Date
Wed May 29 2019
Journal Name
Iraqi Journal Of Physics
Improvement the efficiency of SnO2/n-Si detector by engraving method using a CNC machine
...Show More Authors

Tin oxide was deposited by using vacuum thermal method on silicon wafer engraved by Computer Numerical Controlled (CNC) Machine. The inscription was engraved by diamond-made brine. Deep 0.05 mm in the form of concentric squares. Electrical results in the dark were shown high value of forward current and the high value of the detection factor from 6.42 before engraving to 10.41 after engraving. (I-V) characters in illumination with powers (50, 100, 150, 200, 250) mW/cm2 show Improved properties of the detector, Especially at power (150, 200, 250) mW/cm2. Response improved in rise time from 2.4 μs to 0.72 μs and time of inactivity improved 515.2 μs to 44.2 μs. Sensitivity angle increased at zone from 40o to 65o.

View Publication Preview PDF
Crossref
Publication Date
Thu Aug 01 2019
Journal Name
مجلة العلوم الاقتصادية والإدارية
Improving" Jackknife Instrumental Variable Estimation method" using A class of immun algorithm with practical application
...Show More Authors

Improving" Jackknife Instrumental Variable Estimation method" using A class of immun algorithm with practical application

Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Transport Assessment Using Bayesian Method to Determine Ride-Hailing in Kula Lumpur: A Case Study
...Show More Authors

This research was designed to investigate the factors affecting the frequency of use of ride-hailing in a fast-growing metropolitan region in Southeast Asia, Kuala Lumpur. An intercept survey was used to conduct this study in three potential locations that were acknowledged by one of the most famous ride-hailing companies in Kuala Lumpur. This study used non-parametric and machine learning techniques to analyze the data, including the Pearson chi-square test and Bayesian Network. From 38 statements (input variables), the Pearson chi-square test identified 14 variables as the most important. These variables were used as predictors in developing a BN model that predicts the probability of weekly usage frequency of ride-hai

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Development a Proposed System of Organization Structure to Management Multi Construction Projects
...Show More Authors

The purpose of this study is aimed to lay down an arranged platform suited to Iraqi constructional associations which in charge to carry out multi constructional projects, as it fulfilled management requirements and supervising, so that low - cost projects will be controlled in due term and quality. Based on primary info and observed data collected, the study thesis has been formulated in this way: Iraqi constructional sector bodies which are in charge to implement simultaneously multi constructional projects in need to reformulate its organized structure so that it will be more fitted to management and control of these projects. This thesis includes a
theoretical part contained presenting the most important resources locally and int

... Show More
View Publication Preview PDF
Crossref