To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of both languages.
Abstracts
Removal of heavy metals from waste water has received a great deal of attention. The compare Cr
(VI) adsorption characteristics removing from wastewater by using thermally modified and non-modified
eggshells were examined
The field of Optical Character Recognition (OCR) is the process of converting an image of text into a machine-readable text format. The classification of Arabic manuscripts in general is part of this field. In recent years, the processing of Arabian image databases by deep learning architectures has experienced a remarkable development. However, this remains insufficient to satisfy the enormous wealth of Arabic manuscripts. In this research, a deep learning architecture is used to address the issue of classifying Arabic letters written by hand. The method based on a convolutional neural network (CNN) architecture as a self-extractor and classifier. Considering the nature of the dataset images (binary images), the contours of the alphabet
... Show MoreThis article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec
... Show MoreThe dual nature of asphalt binder necessitates improvements to mitigate rutting and fatigue since it performs as an elastic material under the regime of rapid loading or cold temperatures and as a viscous fluid at elevated temperatures. The present investigation assesses the effectiveness of Nano Alumina (NA), Nano Silica (NS), and Nano Titanium Dioxide (NT) at weight percentages of 0, 2, 4, 6, and 8% in asphalt cement to enhance both asphalt binder and mixture performance. Binder evaluations include tests for consistency, thermal susceptibility, aging, and workability, while mixture assessments focus on Marshall properties, moisture susceptibility, resilient modulus, permanent deformation, and fatigue characteristics. NS notably im
... Show MoreThe dual nature of asphalt binder necessitates improvements to mitigate rutting and fatigue since it performs as an elastic material under the regime of rapid loading or cold temperatures and as a viscous fluid at elevated temperatures. The present investigation assesses the effectiveness of Nano Alumina (NA), Nano Silica (NS), and Nano Titanium Dioxide (NT) at weight percentages of 0, 2, 4, 6, and 8% in asphalt cement to enhance both asphalt binder and mixture performance. Binder evaluations include tests for consistency, thermal susceptibility, aging, and workability, while mixture assessments focus on Marshall properties, moisture susceptibility, resilient modulus, permanent deformation, and fatigue characteristics. NS notably im
... Show MoreThe aim of the study is to diagnose the real level of technology usage in teaching and learning EFL at university from teachers and students’ viewpoints, and see if it is possible to achieve something of the researchers’ dream - accessing top universities. Two questionnaires have been used to measure the range of technology usage in Colleges of Education for Women, Baghdad and Iraqi Universities, and College of Basic Education. The results have shown that the reality of using technology is still away from the dream. The results have been ascribed to two reasons: The first is the little knowledge of using technology in teaching, and the second is that technology is not included in the curriculum.