Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used to encode messages (characters, numbers, and special characters) to binary numbers. Three encoding ideas are proposed for this reason. At the same time, the second step is used Arabic language words to represent the obtained binary sequences to achieve the final secret text. The obtained results exhibited that sending a text containing secret messages in a different language (Arabic) cannot be suspicious when read.
Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
Abstract Lanɡauaɡes, like humans, need communication and interaction to prosper. One of the ways for a language to flourish is to borrow words from other languages. The southern regions of Iran and the coastal countries of Persian Gulf have had strong cultural relations since old times, with language being a dimension of these relations. With their land being geographically located in the realm of Islamic civilization and being Muslims, Baloch people have had strong connections with the Arab world and the Arabic language.Thus, many Arabic words have made their ways into Balochi language either directly or indirectly through persian language. Since each language has its own unique sound structure, these loanwords have undergone ph
... Show MoreEstablishing the systemic character of vocabulary, its relationship with other language systems, their interdependence creates the possibility of a comprehensive scientific study and description of the lexical system of each language, as well as contrastive comparative studies of several languages, including their phraseological composition.
It is known that not all words-components of phraseological units are equivalent in their role in the formation of the semantic content of phraseological units. In this regard, it is necessary to introduce the concept of a lexical dominant. To this we include words, which are kind of centers around which the entire semantic complex of phraseological units, the entire set of its words-componen
... Show MoreIn this research, the X-ray diffraction pattern was used, which was obtained experimentally after preparation of barium oxide powder. A program was used to analyze the X-ray diffraction lines of barium oxide nanoparticles, and then the particle size was calculated by using the Williamson-Hall method, where it was found that the value of the particle size is 25.356 nm. Also, the dislocation density was calculated, which is equal to1.555 x1015 (lines/nm2), and the value of the unit cell number was also calculated, as it is equal to 23831.
The Strategy of employees' empowerment, organizational performance and total quality management represent three informative which were and still the hub of many studies and researches including the current study. The higher education is considered one of the most important services sectors and the main development as well as the civil progress in the society. It is the main source that provides the organizations with the human resources having scientific or practical professions. So Higher Education has been chosen especially Baghdad University as a sample of the study. The study problem is concentrated to find answers of the following questions: What the level of the powers mandate in the organization concerning the
... Show MoreCoumarins have been recognized as anticancer competitors. HDACis are one of the interesting issues in the field of antitumor research. In order to achieve an increased anticancer efficacy, a series of hybrid compounds bearing coumarin scaffolds have been designed and synthesized as novel HDACis, In this review we present a series of novel HDAC inhibitors comprising coumarin as a core e of cap group of HDAC inhibitors that have been designed, synthesized and assessed for their enzyme inhibitory activity as well as antiproliferative activity. Most of them exhibited potent HDAC inhibitory activity and significant cytotoxicity
Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet
... Show More