Preferred Language
Articles
/
eBjX_pYBVTCNdQwCJZTi
Arabic and English Texts Encryption Using Modified Playfair Algorithm
...Show More Authors

To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of both languages.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun May 01 2022
Journal Name
Journal Of Engineering
Attitude and Altitude Control of Quadrotor Carrying a Suspended Payload using Genetic Algorithm
...Show More Authors

The need for quick airborne transportation is critical, especially in emergencies. Drones with suspended payloads might be used to accomplish quick airborne transportation. Due to the environment or the drone's motion, the slung load may oscillate and lead the drone to fall. The altitude and attitude controls are the backbones of the drone's stability, and they must be adequately designed. Because of their symmetrical and simple structure, quadrotor helicopters are one of the most popular drone classes. In this work, a genetic algorithm with two weighted terms fitness function is used to adjust a Proportional-Integral-Derivative (PID) controller to compensate for the altitude and attitude controllers in a quadrotor drone with a slun

... Show More
View Publication
Crossref (5)
Crossref
Publication Date
Sun Oct 05 2025
Journal Name
Mesopotamian Journal Of Computer Science
DGEN: A Dynamic Generative Encryption Network for Adaptive and Secure Image Processing
...Show More Authors

Cyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Aug 02 2024
Journal Name
Quantum Studies: Mathematics And Foundations
Implementation of a modified noise-free and noisy multistage quantum cryptography protocol using QISKIT
...Show More Authors

Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Sep 15 2023
Journal Name
Al-academy
Perceiver And the imaginer in the texts of Yusuf Al _ sayegh
...Show More Authors

This research deals with the perceived and the imagined in the texts of Yusef Al-Sayegh, considering language as the most important source in literature and theatrical criticism, and given the importance of the subject, the researcher monitored many philosophical and psychological opinions and theories related to (the perceived and the imagined), and they were discussed and their compatibility with the Iraqi theatrical t As for the second chapter, where (the theoretical framework), it included two topics, and the first topic was about the concept of the perceived and the imagined, and the second topic was about Youssef Al-Sayegh and the structure of the theatrical text.
In the third chapter, where (research procedures), the research

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 15 2024
Journal Name
Al-academy
Aesthetic Composition Systems of Writings and Texts in Contemporary Arab Sculpture
...Show More Authors

ملخص البحث: تناول البحث الحالي:(أنظمة التكوين الجمالي للكتابات والنصوص في النحت العربي المعاصر)، عددا من الأفكار الأساسية التي تمثل المادة النظرية لتفسير ظاهرة الكتابة في الفن بشكل عام وفي فن النحت بشكل خاص، ولكشف أنظمة التكوين الجمالي وأنواعها المتعددة من خلال فحص بعض النصوص البصرية للفنانين العرب المعاصرين، فقد جاء هذا البحث في أربعة فصول. خصص الفصل الأول: الإطار المنهجي للبحث لبيان مشكلة البحث، وأهم

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 02 2023
Journal Name
Alustath Journal For Human And Social Sciences
THE SEMANTIC ANALYSIS OF PHRASAL VERBS IN AMERICAN AND BRITISH TEXTS
...Show More Authors

Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Nominal Ellipsis in English & Arabic and its Influence on the Translation of the Meanings of Some Selected Qurànic Verses ( A Contrastive study ): هدى فالح حسن & جمانة شكيب محمد
...Show More Authors

Nominal ellipsis is a linguistic phenomenon found in English and Arabic .It is
based on leaving out a part of a nominal construction or more for the sake of good
style , compactness and connectedness .This phenomenon is found in the language of
the Glorious Qur’an .The study in hand is concerned with how translators handle
translating Qur’anic verses which contain ellipted nouns , i ,e. , to what extent the
translated Qur’anic verses are close to the original ones , and to what extent their
translations serve understanding the meanings of the glorious verses while at the
same time maintaining their beauty in style. The study aims at shedding light on
nominal ellipsis in English and Arabic .The study undertak

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Using Iterative Reweighting Algorithm and Genetic Algorithm to Calculate The Estimation of The Parameters Of The Maximum Likelihood of The Skew Normal Distribution
...Show More Authors

Excessive skewness which occurs sometimes in the data is represented as an obstacle against normal distribution. So, recent studies have witnessed activity in studying the skew-normal distribution (SND) that matches the skewness data which is regarded as a special case of the normal distribution with additional skewness parameter (α), which gives more flexibility to the normal distribution. When estimating the parameters of (SND), we face the problem of the non-linear equation and by using the method of Maximum Likelihood estimation (ML) their solutions will be inaccurate and unreliable. To solve this problem, two methods can be used that are: the genetic algorithm (GA) and the iterative reweighting algorithm (IR) based on the M

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 19 2022
Journal Name
Handbook Of Moth-flame Optimization Algorithm
Moth-Flame Optimization Algorithm, Arithmetic Optimization Algorithm, Aquila Optimizer, Gray Wolf Optimizer, and Sine Cosine Algorithm
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Developing Arabic License Plate Recognition System Using Artificial Neural Network and Canny Edge Detection
...Show More Authors

In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny edge detection

... Show More