To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of both languages.
In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MoreThis study highlights the problems of translating Shakespeare's food and drink-related insults (henceforth FDRIs) in (Henry IV, Parts I&II) into Arabic. It adopts (Vinay & Darbelnet's:1950s) model, namely (Direct& Oblique) to highlight the applicability of the different methods and procedures made by the two selected translators (Mashati:1990 & Habeeb:1905) .The present study tries to answer the following questions:(i) To what extent the FDRIs in Henry IV might pose a translational problem for the selected translators to find suitable cultural equivalents for them? (ii) Why do the translators, in many cases, resort to a literal procedure which is almost not worka
... Show MoreDeep learning convolution neural network has been widely used to recognize or classify voice. Various techniques have been used together with convolution neural network to prepare voice data before the training process in developing the classification model. However, not all model can produce good classification accuracy as there are many types of voice or speech. Classification of Arabic alphabet pronunciation is a one of the types of voice and accurate pronunciation is required in the learning of the Qur’an reading. Thus, the technique to process the pronunciation and training of the processed data requires specific approach. To overcome this issue, a method based on padding and deep learning convolution neural network is proposed to
... Show MoreIsobaric Vapor-Liquid-Liquid equilibrium data for the binary systems ethyl acetate + water, toluene + water and the ternary system toluene + ethyl acetate + water were determined by a modified equilibrium still, the still consisted of a boiling and a condensation sections supplied with mixers that helped to correct the composition of the recycled condensed liquid and the boiling temperature readings in the condensation and boiling sections respectively. The VLLE data where predicted and correlated using the Peng-Robinson Equation of State in the vapor phase and one of the activity coefficient models Wilson, NRTL, UNIQUAC and the UNIFAC in the liquid phase and also were correlated using the Peng-Robinson Equation of State in both the vapo
... Show MoreAbstract
In this work, two algorithms of Metaheuristic algorithms were hybridized. The first is Invasive Weed Optimization algorithm (IWO) it is a numerical stochastic optimization algorithm and the second is Whale Optimization Algorithm (WOA) it is an algorithm based on the intelligence of swarms and community intelligence. Invasive Weed Optimization Algorithm (IWO) is an algorithm inspired by nature and specifically from the colonizing weeds behavior of weeds, first proposed in 2006 by Mehrabian and Lucas. Due to their strength and adaptability, weeds pose a serious threat to cultivated plants, making them a threat to the cultivation process. The behavior of these weeds has been simulated and used in Invas
... Show MoreThis study explores the language used in reporting political headlines conducting a rhetorical stylistic analysis. It is based on showing the effect of the rhetorical stylistic relations in news reporting. The aim is to investigate the structure adopted in reporting political news. It argues that the rhetorical stylistic devices are necessary and applicable to non-literary texts, i.e. political headlines to evaluate language use in the representation of non-literary texts. The analysis was carried out on data selected from the British broadsheet The Guardian and the American New York Times newspaper headlines. The data were examined and subjected to a contrastive analysis incorporating rhetorical and stylistic tools to discern h
... Show MoreTranslation is a vital process that needs much more understanding and mutual background knowledge on the part of ESL or EFL learners in terms of grammar , meaning and context of both the SL and TL . Thus , the main aim of the current research paper is to identify and figure out the techniques used by ESL or EFL learners when translating English barnyard verbs into Arabic . The main problem of this study is attributed to the fact that ESL or EFL learners may not be able to identify and understand the connotative meaning of barnyard verbs since these verbs are onomatopoeic (i.e,) a word that phonetically imitates, or suggests the source of sound that it describes. Therefore they may be unable to translate these verbs appropriately and accura
... Show MoreThis paper identifies and describes the textual densities of ideational metaphors through the application of GM theory (Halliday, 1994) to the textual analysis of two twentieth century English short stories: one American (The Mansion (1910-11), by Henry Jackson van Dyke Jr.), and one British (Home (1951), by William Somerset Maugham). One aim is to get at textually verifiable statistical evidence that attests to the observed dominance of GM nominalization in academic and scientific texts, rather than to fiction (e.g. Halliday and Martin (1993). Another aim is to explore any significant differentiation in GM’s us by the two short- story writers. The research has been carried out by identifying, describing, and statistically analysi
... Show MoreThe current study is concerned with investigating the difficulties that Iraqi EFL learners of English may face when translating English collective nouns. Such collective nouns as committee, government, , jury , Parliament , etc. are considered singular when the concept of the unity as a group is emphasized , but when the concept of the individuals or numbers is emphasized they are treated as plural. A sample of twenty undergraduate students have been selected randomly to translate certain English collective nouns in some selected political texts in order to find out the difficulties they might face in rendering them into Arabic. It is hypothesized that most of the testees have used the singular form rather than the plural ignoring the
... Show MoreThis study aims at discussing how gender differences might affect communication among people. For this purpose, several TV interviews are selected and examined on the discourse level. Developing a model of analysis ,is found that certain linguistics have been used by male speakers ,whereas different aspects have been utilized my female speakers like deictic expressions and lexical items of emotion and delicacy .