Preferred Language
Articles
/
fRbmvYoBVTCNdQwCDaS4
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used to encode messages (characters, numbers, and special characters) to binary numbers. Three encoding ideas are proposed for this reason. At the same time, the second step is used Arabic language words to represent the obtained binary sequences to achieve the final secret text. The obtained results exhibited that sending a text containing secret messages in a different language (Arabic) cannot be suspicious when read.

Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
A Study on Co – odd (even) Sum Degree Edge Domination Number in Graphs
...Show More Authors

 An edge dominating set    of a graph  is said to be an odd (even) sum degree edge dominating set (osded (esded) - set) of G if the sum of the degree of all edges in X is an odd (even) number. The odd (even) sum degree edge domination number  is the minimum cardinality taken over all odd (even) sum degree edge dominating sets of G and is defined as zero if no such odd (even) sum degree edge dominating set exists in G. In this paper, the odd (even) sum degree domination concept is extended on the co-dominating set E-T of a graph G, where T is an edge dominating set of G.  The corresponding parameters co-odd (even) sum degree edge dominating set, co-odd (even) sum degree edge domination number and co-odd (even) sum degree edge domin

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Mon Feb 10 2025
Journal Name
International Linguistics Research
A Semiotic Study of Reduplicative Words in Selected American Slang Expressions
...Show More Authors

This study explores the semiotic aspects of American slang, specifically focusing on the phenomenon of reduplicative expressions in informal speech. Despite the extensive research on American slang, limited attention has been given to the cultural and mythical meanings embedded within reduplicative expressions. To address this gap, the study investigates how these expressions convey denotative, connotative, and mythical meanings within casual American discourse. The objectives of the study include: 1. To what extent does Barthes’ semiotic model hold potential for application in this study? 2. How are reduplicative slang expressions widely used in everyday American life? 3. To what extent do qualitative and quantitative methods hav

... Show More
View Publication
Crossref
Publication Date
Sat Feb 26 2011
Journal Name
Iraqi Journal Of Agricultural Sciences 42 (6), 54-64‏
RELATION OF IRRIGATION WATER SALINITY TO SOME VEGETATIVE CHARACTERS OF OLIVE‏
...Show More Authors

Publication Date
Thu Apr 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Morphological Characters Study For Satureja L. Species ( Labiatae)in Iraq
...Show More Authors

    The morphological characters of   Satureja L.  species which is grown in Iraq were studied in detail ,starting from root,stem,leaves ,inflorescences ,flowers and fruits .The current study revelid that the characters of calyx and corolla have great important taxonomically ,besides the variations in the shape and size of leaves and bract ,figures were drawen  ,schedules and plates have been prepared.The indumentums study showed  that the trichomes have important taxonomically value of both glandular and eglandular hairs.

View Publication Preview PDF
Publication Date
Fri Apr 18 2025
Journal Name
Актуальные проблемы обучения русскому языку Xiii
ARABIC PHONO-GRAMMAR AND ITS RUSSIAN EQUIVALENTS AS A NEW APPROACH IN FL TEACHING (RUSSIAN AND ARABIC IN RUSSIAN AND ARABIC CLASSROOMS)
...Show More Authors

Central and Eastern European Online Library - CEE journals, documents, articles, periodicals, books available online for download, Zeitschrfitendatenbank, Online Zeitschriften, Online Zeitschriftendatenbank

View Publication
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Intelligent Systems
A study on predicting crime rates through machine learning and data mining using text
...Show More Authors
Abstract<p>Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o</p> ... Show More
View Publication
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Jun 08 2023
Journal Name
Iraqi Journal Of Laser
PDF The effect of nanoelectrodes number and length on enhancing the THz photomixer performance
...Show More Authors

Abstract: Despite the distinct features of the continuous wave (CW) Terahertz (THz) emitter using photomixing technique, it suffers from the relatively low radiation output power. Therefore, one of effective ways to improve the photomixer emitter performance was using nanodimensions electrodes inside the optical active region of the device. Due to the nanodimension sizes and good electrical conductivity of silver nanowires (Ag-NWs), they have been exploited as THz emitter electrodes. The excited surface plasmon polariton waves (SPPs) on the surface of nanowire enhances the incident excitation signal. Therefore, the photomixer based Ag-NW compared to conventional one significantly exhibits higher THz output signal. In thi

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 25 2021
Journal Name
Engineering And Technology Journal
The Effect of the Number of Key-Frames on the Facial Emotion Recognition Accuracy
...Show More Authors

Key-frame selection plays an important role in facial expression recognition systems. It helps in selecting the most representative frames that capture the different poses of the face. The effect of the number of selected keyframes has been studied in this paper to find its impact on the final accuracy of the emotion recognition system. Dynamic and static information is employed to select the most effective key-frames of the facial video with a short response time. Firstly, the absolute difference between the successive frames is used to reduce the number of frames and select the candidate ones which then contribute to the clustering process. The static-based information of the reduced sets of frames is then given to the fuzzy C-Means algor

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Mar 30 2001
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Arabic Abstracts
...Show More Authors

Abstracts

View Publication Preview PDF
Publication Date
Fri Aug 02 2024
Journal Name
Quantum Studies: Mathematics And Foundations
Implementation of a modified noise-free and noisy multistage quantum cryptography protocol using QISKIT
...Show More Authors

Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref