To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of both languages.
Gas-lift technique plays an important role in sustaining oil production, especially from a mature field when the reservoirs’ natural energy becomes insufficient. However, optimally allocation of the gas injection rate in a large field through its gas-lift network system towards maximization of oil production rate is a challenging task. The conventional gas-lift optimization problems may become inefficient and incapable of modelling the gas-lift optimization in a large network system with problems associated with multi-objective, multi-constrained, and limited gas injection rate. The key objective of this study is to assess the feasibility of utilizing the Genetic Algorithm (GA) technique to optimize t
The Asphalt cement is produced as a by-product from the oil industry; the asphalt must practice further processing to control the percentage of its different ingredients so that it will be suitable for paving process. The objective of this work is to prepare different types of modified Asphalt cement using locally available additives, and subjecting the prepared modified Asphalt cement to testing procedures usually adopted for Asphalt cement, and compare the test results with the specification requirements for the modified Asphalt cement to fulfill the paving process requirements. An attempt was made to prepare the modified Asphalt cement for pavement construction in the laboratory by digesting each of the two penetration grade Asphalt c
... Show MoreAbsract
The letters of the Al-Safa Brothers contain many tales, in which each story is a literary text that is independent from the other texts, but it constitutes a unified entity in its entirety, because these stories contain recurring structural elements that go into building each one of them. The stories - the subject of the analysis - were not keen on something that was keen on adhering to the Sufi vision and its apparent effect on the tales of the messages, starting with the announcement of the narration to the narrator and his attempt to persuade the recipient of the truth of what is being told and its realism, and made him believe it. The stories correspond to the formal construction of the ideal style defined by th
... Show MoreThis article discusses a discussion of trends and patterns of understanding and application of the concept of metaphor to various subjects that may interfere with the perspective of metaphors in translation theory, an attempt was made to use the principles and characteristics of metaphors and their fundamental tradition in translation theory, and to uncover the perspective of considering metaphor as a conceptual process. presenting its merits, since it is still considered an eccentric expression of linguistics.
The linguistic researcher reads a systematic crisis, idiomatic problems within the linguistic term coming to the Arab culture. Where most of them return back to problems of receiving these sciences which are represented by phenomena like the multiplicity linguistic term, disturbance translated idiomatic concept and its duality.
Aims of the research :
1-Initializing new textbooks to form linguistic project and Arabic linguistic theory.
2-Determination adjusted knowledge, concepts of Arabian heritage linguistics subject
3-Observation the causes of disturbance crisis of linguistic term and its relation to
... Show MoreThis study involved preparation of Graphene oxide (GO) and reduced graphene oxide (RGO) using Hummer method and chemical method respectively. These carbon nanomaterials were used as starting material to make novel functionalize with thiocarbohydrazide (TCH) which was prepared by reacting CS2 with hydrazine to form GO or RGO- 4-amino,5-substituted 1H,1,2,4 Triazole 5(4H) thion (ASTT) ,(GOT) and( RGOT) respectively via cyclocondensation reaction. Also MnO2 nanorod was prepared to form hybridized with GOT and RGOT. A commercial multiwall carbon nanotube (MWCNT) and functionalization with carboxylic groups' (f-MWCNT) and its nanocomposite with GOT were also prepared. All carbon nanomaterials were characterized with different techniques such as
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More