To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of both languages.
Nominal ellipsis is a linguistic phenomenon found in English and Arabic .It is
based on leaving out a part of a nominal construction or more for the sake of good
style , compactness and connectedness .This phenomenon is found in the language of
the Glorious Qur’an .The study in hand is concerned with how translators handle
translating Qur’anic verses which contain ellipted nouns , i ,e. , to what extent the
translated Qur’anic verses are close to the original ones , and to what extent their
translations serve understanding the meanings of the glorious verses while at the
same time maintaining their beauty in style. The study aims at shedding light on
nominal ellipsis in English and Arabic .The study undertak
ملخص البحث: تناول البحث الحالي:(أنظمة التكوين الجمالي للكتابات والنصوص في النحت العربي المعاصر)، عددا من الأفكار الأساسية التي تمثل المادة النظرية لتفسير ظاهرة الكتابة في الفن بشكل عام وفي فن النحت بشكل خاص، ولكشف أنظمة التكوين الجمالي وأنواعها المتعددة من خلال فحص بعض النصوص البصرية للفنانين العرب المعاصرين، فقد جاء هذا البحث في أربعة فصول. خصص الفصل الأول: الإطار المنهجي للبحث لبيان مشكلة البحث، وأهم
... Show MoreThis research deals with the perceived and the imagined in the texts of Yusef Al-Sayegh, considering language as the most important source in literature and theatrical criticism, and given the importance of the subject, the researcher monitored many philosophical and psychological opinions and theories related to (the perceived and the imagined), and they were discussed and their compatibility with the Iraqi theatrical t As for the second chapter, where (the theoretical framework), it included two topics, and the first topic was about the concept of the perceived and the imagined, and the second topic was about Youssef Al-Sayegh and the structure of the theatrical text.
In the third chapter, where (research procedures), the research
In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny edge detection
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the
... Show MoreCentral and Eastern European Online Library - CEE journals, documents, articles, periodicals, books available online for download, Zeitschrfitendatenbank, Online Zeitschriften, Online Zeitschriftendatenbank
<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MoreHuman posture estimation is a crucial topic in the computer vision field and has become a hotspot for research in many human behaviors related work. Human pose estimation can be understood as the human key point recognition and connection problem. The paper presents an optimized symmetric spatial transformation network designed to connect with single-person pose estimation network to propose high-quality human target frames from inaccurate human bounding boxes, and introduces parametric pose non-maximal suppression to eliminate redundant pose estimation, and applies an elimination rule to eliminate similar pose to obtain unique human pose estimation results. The exploratory outcomes demonstrate the way that the proposed technique can pre
... Show More