To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of both languages.
In many video and image processing applications, the frames are partitioned into blocks, which are extracted and processed sequentially. In this paper, we propose a fast algorithm for calculation of features of overlapping image blocks. We assume the features are projections of the block on separable 2D basis functions (usually orthogonal polynomials) where we benefit from the symmetry with respect to spatial variables. The main idea is based on a construction of auxiliary matrices that virtually extends the original image and makes it possible to avoid a time-consuming computation in loops. These matrices can be pre-calculated, stored and used repeatedly since they are independent of the image itself. We validated experimentally th
... Show MoreOptical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm
... Show MoreThe present study aims at empirically investigating the effect of vocabulary learning strategies on Iraqi intermediate school students’vocabulary performance and reading comprehension. The population of the present study includes all the 1st year male students of Al-Wark’a intermediate school of Al-Risafa 1/ General Directorate of Education for the first course of the academic year (2015-2016). To achieve the aim of the study ,a pre-test and post-test after (5) weeks of experiment are administrated .The sample of the present study consists of (100) subjects :(50) students as an experimental group and other (50) students as a control group . The subj
... Show MoreThe principal concern of this study is Disjunct and Conjunct adverbials in the
English language. The study sets out to explore and clarify the types, nature and
structure of disjuncts and conjuncts. It also aims at testing student's performance to
evaluate the use and usage of the disjuncts and conjuncts in their written performance.
Two tests, accordingly, were given to some fifty students of at the Dept. of English, at
the college of languages (third and fourth stages) in the University of Sulaimani. The
hypothesis that the study was based on are those students use disjuncts and conjuncts
hardly enough in their writings and when doing so, they generally tend to stick only to
the most commonly used and familiar o
The article is devoted to the issue of word-formation motivation, which does not lose its relevance and plays a role not only in disclosing formal-semantic relations between words of one language and has not only theoretical, but also applied significance. The authors consider word-formation motivation consistently in its varieties in a comparative way on the materials of so different languages as Russian and Arabic and approach the mechanism of achieving semantic equivalence of translation. To the greatest extent, word-formation activity today, due to objective reasons, affects some special branch (technical, medical, etc.) vocabulary, which is increasing from year to year in national dictionaries. This extensive material, selected
... Show MoreThe present study investigates the relation between the biliteral and triliteral roots which is the introduction to comprehend the nature of the Semitic roots during its early stage of development being unconfirmed to a single pattern. The present research is not meant to decide on the question of the biliteral roots in the Semitic languages, rather it is meant to confirm the predominance of the triliteral roots on these languages which refers, partially, to analogy adopted by the majority of linguists. This tendency is frequently seen in the languages which incline to over generalize the triliteral phenomenon, i. e., to transfer the biliteral roots to the triliteral room, that is, to subject it to the predominant pattern regarding the r
... Show MoreThis research deals with the topic of "the status of women" in the literature of Sufism. The researcher cites a bundle of mystical yarns, and examples of verses and poems from this high literature that look at women with reverence and appreciation. The researcher tried to find an appropriate explanation and away from the arbitrariness of the symbols used by the poets of Islamic Sufism In their poems.
The research is considered a comparative study of the Arabic and Kurdish dialects, by selecting six famous poets from the literature of literature, three of them from Arabic literature, and the other three from Kurdish literature, so the research is di
... Show MoreThis research deals with the topic (the position of women) in the literature literature, and the researcher cites a bouquet of woolen yarn, examples of verses and poems from this fine literature that looks at the woman with respect and appreciation. In their poems.
The research is a comparative search for Arab and Kurdish literature, by selecting six famous poets in the literature, three of them are from Arabic literature, and the other three are from Kurdish literature, and thus the research is divided into two subjects and six demands.
Finally, the researcher tried to set a brick that would be an entry point to find an indicative explanation and a suitable explanation that would break those symbols and signs that caused the exp
This study was conducted to examine the discharge capacity of the reach of the Tigris River between Kut and Amarah Barrages of 250km in length. The examination includes simulation the current capacity of the reach by using HEC-RAS model. 247cross sections surveyed in 2012 were used in the simulation. The model was calibrated using observed discharges of 533, 800, 1025 and 3000m3/s discharged at Kut Barrage during 2013, 1995, 1995 and 1988, respectively, and its related water level at three gauge stations located along the reach. The result of calibration process indicated that the lowest Root Mean Square Error of 0.095 can be obtained when using Manning’s n coefficient of 0.026, 0.03 for th
... Show MorePermanent deformation, fatigue and thermal cracking are the three typical distresses of flexible pavement. Using hydrated lime (HL) into the conventional limestone mineral additive has been widely practiced, including in Europe, to improve the mechanical properties of hot mix asphalt (HMA) concrete and as the result the durability of the constructed pavement. Large number of experimental studies have been reported to find the optimum addition of HL for the improvement on HMA concrete mechanical properties, moisture susceptibility and fatigue resistance. Pavement in service is under complex thermomechanical stress-strain conditions due to coupled atmospheric and surrounding environment temperature variation and the traffic loading. To predic
... Show More