To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of both languages.
In 2020 one of the researchers in this paper, in his first research, tried to find out the Modified Weighted Pareto Distribution of Type I by using the Azzalini method for weighted distributions, which contain three parameters, two of them for scale while the third for shape.This research compared the distribution with two other distributions from the same family; the Standard Pareto Distribution of Type I and the Generalized Pareto Distribution by using the Maximum likelihood estimator which was derived by the researchers for Modified Weighted Pareto Distribution of Type I, then the Mont Carlo method was used–that is one of the simulation manners for generating random samples data in different sizes ( n= 10,30,50), and in di
... Show MorePoly(L-lactic acid) (PLLA)/poly(caprolactone) (PCL) and two types of organoclay (OMMT) including a fatty amide and ocatdecylamine montmorillonite (FA-MMT and ODA-MMT) were employed to produce polymer nanocomposites by melt blending. Materials were characterized using X-ray diffraction (XRD), Fourier transform infrared (FTIR) spectroscopy, thermogravimetric analysis (TGA), elemental analysis, scanning electron microscopy (SEM) and transmission electron microscopy (TEM). Mechanical properties were also investigated for these nanocomposites. The nanocomposites showed increasing mechanical properties and thermal stability. XRD results indicated that the materials formed nanocomposites. SEM morphology showed that increasing content of OMMT reduc
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThe current research seeks to know the difficulties in memorizing literary texts with fourth grade students from teachers’ point of view of and students
The research contains a community of (10,870) students from schools affiliated to the Directorate of Karkh, second and the number of schools for boys and girls (79) School and the number of teachers (349) who are specialized in teaching Arabic language to fourth grade preparatory students and there was a section of a randomly sample of each of the students, teachers and schools .
Some actions which can be listed below:-The survey which was done by the researcher for the views of the two samples from teachers and students as the number of teachers covered in this research (20) and
Arabic calligraphy is one of the greatest achievements of Islamic art. The visual form of Arabic calligraphy is the primary means of presenting ideas and messages for expressive communication in Arabic typefaces. Emerging computer technology with calligraphy is essential for effective visual designs; however, traditional typefaces are insufficient in number and quality to fulfill the requirements of the current Saudi industry. Thus, this research investigates the processes followed by graphic designers to create modern Arabic type designs inspired by Arabic calligraphy, and presents the characteristics of Arabic calligraphy. The research implemented a mixed experimental and descriptive method, exploring 10 typefaces designed by professio
... Show MoreAbsract
The letters of the Al-Safa Brothers contain many tales, in which each story is a literary text that is independent from the other texts, but it constitutes a unified entity in its entirety, because these stories contain recurring structural elements that go into building each one of them. The stories - the subject of the analysis - were not keen on something that was keen on adhering to the Sufi vision and its apparent effect on the tales of the messages, starting with the announcement of the narration to the narrator and his attempt to persuade the recipient of the truth of what is being told and its realism, and made him believe it. The stories correspond to the formal construction of the ideal style defined by th
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreLED is an ultra-lightweight block cipher that is mainly used in devices with limited resources. Currently, the software and hardware structure of this cipher utilize a complex logic operation to generate a sequence of random numbers called round constant and this causes the algorithm to slow down and record low throughput. To improve the speed and throughput of the original algorithm, the Fast Lightweight Encryption Device (FLED) has been proposed in this paper. The key size of the currently existing LED algorithm is in 64-bit & 128-bit but this article focused mainly on the 64-bit key (block size=64-bit). In the proposed FLED design, complex operations have been replaced by LFSR left feedback technology to make the algorithm perform more e
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More