Preferred Language
Articles
/
eBjX_pYBVTCNdQwCJZTi
Arabic and English Texts Encryption Using Modified Playfair Algorithm
...Show More Authors

To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of both languages.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 18 2018
Journal Name
International Journal Of Research In Social Sciences And Humanities
Breaching the Cooperative Principle Theory in English and Russian One Act Plays
...Show More Authors

PDBNRSIA Asst, International Journal of Research in Social Sciences and Humanities, 2018

View Publication
Publication Date
Wed Jun 29 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Kinetics and Energetic Parameters Study of Phenol Removal from Aqueous Solution by Electro-Fenton Advanced Oxidation Using Modified Electrodes with PbO2 and Graphene
...Show More Authors

The Electro-Fenton oxidation process is one of the essential advanced electrochemical oxidation processes used to treat Phenol and its derivatives in wastewater. The Electro-Fenton oxidation process was carried out at an ambient temperature at different current density (2, 4, 6, 8 mA/cm2) for up to 6 h. Sodium Sulfate at a concentration of 0.05M was used as a supporting electrolyte, and 0.4 mM of Ferrous ion concentration (Fe2+) was used as a catalyst. The electrolyte cell consists of graphite modified by an electrodepositing layer of PbO2 on its surface as anode and carbon fiber modified with Graphene as a cathode. The results indicated that Phenol concentration decreases with an increase in current dens

... Show More
View Publication Preview PDF
Crossref (10)
Crossref
Publication Date
Wed Jun 21 2023
Journal Name
Journal Of Electrochemical Science And Engineering
Phenol removal by electro-Fenton process using a 3D electrode with iron foam as particles and carbon fibre modified with graphene
...Show More Authors

The 3D electro-Fenton technique is, due to its high efficiency, one of the technologies suggested to eliminate organic pollutants in wastewater. The type of particle electrode used in the 3D electro-Fenton process is one of the most crucial variables because of its effect on the formation of reactive species and the source of iron ions. The electrolytic cell in the current study consisted of graphite as an anode, carbon fiber (CF) modified with graphene as a cathode, and iron foam particles as a third electrode. A response surface methodology (RSM) approach was used to optimize the 3D electro-Fenton process. The RSM results revealed that the quadratic model has a high R2 of 99.05 %. At 4 g L-1 iron foam particles, time of 5 h, and

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Sep 22 2019
Journal Name
Journal Of The College Of Education For Women
Heritage in Abdul Wahab Al-Bayati's Divan Collection of Poems: Oriental Texts
...Show More Authors

Heritage reflects peoples' memory and essence of nations. Thus, this divan was really the material and tool for writers in general and poets in specific both in their artificial innovations . Accordingly, modern writers have endeavored to bring heritage back in all its details and occurrences. Abdullwahab Al-Bayati's experience had reflected his innovative and strong link with the humanitarian heritage, in that heritage in view of Al-Bayati means both the humanitarian expertise and gains that are able to extend from past to future passing through the present.From this, the poet had not disconnected his strong link with the Arab poetic heritage .Thus, the poet had utilized the Arab poetic heritage in expressing on the Arab contrary realit

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 25 2019
Journal Name
Al-academy
The Effectiveness of the Symbol in Iraqi Monodrama Texts: محمد علي ابراهيم
...Show More Authors

This research studies the effectiveness of the symbol in the Iraqi monodrama texts. The methodological framework is devoted to the research problem and the need for conducting it, its importance, the purpose of research, and the definition of the most important terms. The research problem dealt with the concept of the effectiveness of the symbol, the monodrama, and the working levels of the symbol in the monodrama texts of the author, in addition to the disclosure of the artistic vision embodied by the playwright in the use of the symbol within the literary product, as well as the development of the creative process. The research problem was defined by the following question: How effective is the symbol in the Iraqi Monodrama texts?
T

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Noun markers in Arabic
...Show More Authors

This study aims to show the markers of the Arabic noun(genitive, nun nation articles,
vocative, definite article and predication). These markers distinguish the noun from other
parts of sentence. It alsoaims at showing why these markers are peculiar to nouns.

View Publication Preview PDF
Publication Date
Fri Feb 14 2014
Journal Name
International Journal Of Computer Applications
Parallelizing RSA Algorithm on Multicore CPU and GPU
...Show More Authors

View Publication
Crossref (10)
Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Bulletin Of Electrical Engineering And Informatics
Solid waste recycling and management cost optimization algorithm
...Show More Authors

Solid waste is a major issue in today's world. Which can be a contributing factor to pollution and the spread of vector-borne diseases. Because of its complicated nonlinear processes, this problem is difficult to model and optimize using traditional methods. In this study, a mathematical model was developed to optimize the cost of solid waste recycling and management. In the optimization phase, the salp swarm algorithm (SSA) is utilized to determine the level of discarded solid waste and reclaimed solid waste. An optimization technique SSA is a new method of finding the ideal solution for a mathematical relationship based on leaders and followers. It takes a lot of random solutions, as well as their outward or inward fluctuations, t

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Multifactor Algorithm for Test Case Selection and Ordering
...Show More Authors

Regression testing being expensive, requires optimization notion. Typically, the optimization of test cases results in selecting a reduced set or subset of test cases or prioritizing the test cases to detect potential faults at an earlier phase. Many former studies revealed the heuristic-dependent mechanism to attain optimality while reducing or prioritizing test cases. Nevertheless, those studies were deprived of systematic procedures to manage tied test cases issue. Moreover, evolutionary algorithms such as the genetic process often help in depleting test cases, together with a concurrent decrease in computational runtime. However, when examining the fault detection capacity along with other parameters, is required, the method falls sh

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus Crossref