To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of both languages.
Boltzmann mach ine neural network bas been used to recognize the Arabic speech. Fast Fourier transl(>lmation algorithm has been used t() extract speciral 'features from an a caustic signal .
The spectral feature size is reduced by series of operations in
order to make it salable as input for a neural network which is used as a recogni zer by Boltzmann Machine Neural network which has been used as a recognizer for phonemes . A training set consist of a number of Arabic phoneme repesentations, is used to train lhe neuntl network.
The neural network recognized Arabic. After Boltzmann Machine Neura l network training the system with
... Show MoreSearch came (the employment of Arabic calligraphy in gold jewelry styles) four chapters, the first chapter of which dealt:A/research problem B/importance of research C/targets search D/ Define termsAs the aim of the research (to identify the employment of different forms of Arabic calligraphy on gold jewelry styles).It came in the second quarter (the theoretical framework and previous studies), some of the topics reviewed in which diversities researcher aesthetic and functional, and various uses that filled Arabic calligraphy.The third chapter outlining the researcher methodology and the research community, has a special form for the analysis of the samples are designed as form is offered on a number of experts in the field of jurisdicti
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreDeaf and dumb peoples are suffering difficulties most of the time in communicating with society. They use sign language to communicate with each other and with normal people. But Normal people find it more difficult to understand the sign language and gestures made by deaf and dumb people. Therefore, many techniques have been employed to tackle this problem by converting the sign language to a text or a voice and vice versa. In recent years, research has progressed steadily in regard to the use of computers to recognize and translate the sign language. This paper reviews significant projects in the field beginning with important steps of sign language translation. These projects can b
Personification in Arab poetry is not confined to the abstract items in nature: it trespasses them to include more than that. We found after reviewing the anthologies of the poets tens of the personified items are full of human attributes - via personification- such as speaking, moving, feeling human feelings.. Personification formed a remarkable feature in the relationship between poets and war, which was clear in the Pre-Islamic poetry, because it occupied the minds of the ancient Arab mindset. The poets have envisioned war as ugly as a force that brings destruction and devastation. The paper aims at stating the position in which poets personified war with female tributes. Thus, it is impregnated, conceived, and produced birth like a w
... Show MoreArabic text categorization for pattern recognitions is challenging. We propose for the first time a novel holistic method based on clustering for classifying Arabic writer. The categorization is accomplished stage-wise. Firstly, these document images are sectioned into lines, words, and characters. Secondly, their structural and statistical features are obtained from sectioned portions. Thirdly, F-Measure is used to evaluate the performance of the extracted features and their combination in different linkage methods for each distance measures and different numbers of groups. Finally, experiments are conducted on the standard KHATT dataset of Arabic handwritten text comprised of varying samples from 1000 writers. The results in the generatio
... Show MoreAbstract
Suffering the human because of pressure normal life of exposure to several types of heart disease as a result of due to different factors. Therefore, and in order to find out the case of a death whether or not, are to be modeled using binary logistic regression model
In this research used, one of the most important models of nonlinear regression models extensive use in the modeling of applications statistical, in terms of heart disease which is the binary logistic regression model. and then estimating the parameters of this model using the statistical estimation methods, another problem will be appears in estimating its parameters, as well as when the numbe
... Show MoreThis thesis aims to study the effect of addition polymer materials on mechanical properties of self-compacting concrete, and also to assess the influence of petroleum products (kerosene and gas oil) on mechanical properties of polymer modified self-compacting concrete (PMSCC) after different exposure periods of (30 ,60 ,90 ,and 180 days).
Two type of curing are used; 28 days in water for SCC and 2 days in water followed 26 days in air for PMSCC.
The test results show that the PMSCC (15% P/C ratio) which is exposed to oil products recorded a lower deterioration in compressive strength's values than reference concrete. The percentages of reduction in compressive strength values of PMSCC (15% P/C ratio) was
... Show More