To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of both languages.
Background: Studying and investigating the transverse strength(Ts), impact strength(Is), hardness (Hr) and surface roughness(Ra) of conventional and modified autopolymerizing acrylic resin with different weight percentages of biopolymer kraftlignin, after curing in different water temperatures; 40°C and 80°C. Material and Methods: Standard acrylic specimens were fabricated according to ADA specification No.12 for transverse strength, ISO 179 was used for impact testing, Shore D for hardness and profilometerfor surface roughness. The material lignin first dispersed in the monomer, then the powder PMMA is immediately added. Ligninadded in different weight percentages. Then cured using pressure pot (Ivomet) in two temperatures;40°C a
... Show MoreObjectives: This study aims to assess and compare the micro-shear bond strength (μSBS) of a novel resin-modified glass-ionomer luting cement functionalized with a methacrylate co-monomer containing a phosphoric acid group, 30 wt% 2-(methacryloxy) ethyl phosphate (2-MEP), with different substrates (dentin, enamel, zirconia, and base metal alloy). This assessment is conducted in comparison with conventional resin-modified glass ionomer cement and self-adhesive resin cement. Materials and methods: In this in vitro study, ninety-six specimens were prepared and categorized into four groups: enamel (A), dentin (B), zirconia (C), and base metal alloys (D). Enamel (E) and dentin (D) specimens were obtained from 30 human maxillary first premolars e
... Show MoreThe current study aimed to reveal the moral values available in the Arabic language textbook (Al-Mu’nes) for grades eleven and twelve for post-basic education in the Sultanate of Oman. The researcher adopted the descriptive approach using the sentence as measuring unit in the analysis process. The five fields of moral values and their subcategories values represented the categories of the analysis. Iterations of values and the percentages of iteration were calculated in those textbooks. Moreover and the analysis and stability of the process were confirmed.
After referring to previous studies, it was possible to de
... Show MoreDue to the availability of technology stemming from in-depth research in this sector and the drawbacks of other identifying methods, biometrics has drawn maximum attention and established itself as the most reliable alternative for recognition in recent years. Efforts are still being made to develop a user-friendly system that is up to par with security-system requirements and yields more reliable outcomes while safeguarding assets and ensuring privacy. Human age estimation and Gender identification are both challenging endeavours. Biomarkers and methods for determining biological age and gender have been extensively researched, and each has advantages and disadvantages. Facial-image-based positioning is crucial for many application
... Show MoreWhen writing a text, such as a newspaper article, various types of discourse markers are frequently used to group sentences into paragraphs and parts in order to establish a discourse with certain functions, such as coordination, orientation, emphasizing the concepts presented, etc. It should also be noted that this type of mark exists in both written and spoken language. Therefore, it is convenient to dedicate a chapter to these linguistic elements to clarify their use and their classification, which is mainly based on Jose Portolés (2001), as well as the main features, specifically their features (prosodic, morphological, semantic and pragmatic).
Resumen
... Show More
Abstract Lanɡauaɡes, like humans, need communication and interaction to prosper. One of the ways for a language to flourish is to borrow words from other languages. The southern regions of Iran and the coastal countries of Persian Gulf have had strong cultural relations since old times, with language being a dimension of these relations. With their land being geographically located in the realm of Islamic civilization and being Muslims, Baloch people have had strong connections with the Arab world and the Arabic language.Thus, many Arabic words have made their ways into Balochi language either directly or indirectly through persian language. Since each language has its own unique sound structure, these loanwords have undergone ph
... Show MoreLe Petit Prince est apparu en 1943 vers la fin de la vie de son auteur. La mondialité qu'a gagnée ce récit le rend un des livres les plus lus et les plus vendus dans le monde. Cette popularité en fait un des classiques de la littérature française.
En effet la littérature française a un impact profond et direct sur la vie intellectuelle et littéraire dans le monde arabe. La circulation des œuvres littéraires écrites en français a bien influencé les lecteurs arabes soit en langue française soit traduites en arabe. Cette réalité est identique lorsqu'on parle de la réception du Petit Prince ; l'œuvre la plus connue dans le monde entier dès son apparition officielle.
Ab
... Show Moreorder to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs

Huge number of medical images are generated and needs for more storage capacity and bandwidth for transferring over the networks. Hybrid DWT-DCT compression algorithm is applied to compress the medical images by exploiting the features of both techniques. Discrete Wavelet Transform (DWT) coding is applied to image YCbCr color model which decompose image bands into four subbands (LL, HL, LH and HH). The LL subband is transformed into low and high frequency components using Discrete Cosine Transform (DCT) to be quantize by scalar quantization that was applied on all image bands, the quantization parameters where reduced by half for the luminance band while it is the same for the chrominance bands to preserve the image quality, the zig
... Show More