Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used to encode messages (characters, numbers, and special characters) to binary numbers. Three encoding ideas are proposed for this reason. At the same time, the second step is used Arabic language words to represent the obtained binary sequences to achieve the final secret text. The obtained results exhibited that sending a text containing secret messages in a different language (Arabic) cannot be suspicious when read.
Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show MoreCognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections. Schema and text world theories are useful tools in cognitive stylistic studies. The reader's perception o
... Show MoreLanguage as a means of communication has long been the concern of many conversation analysts in their studies such as: Sacks et al. (1974), Schegloff et al. (1977), Duncan (1972), Grice (1975) and Burton (1980). Burton has attempted analyzing the first ten transitions of the play “The Dumb Waiter” for mere a presentation of her approach. This paper aims at analyzing the conversational structure of forum on the subject of literary fiction and genre fiction by applying Burton’s model (1980) of analysis to answer the question to what extent this model is applicable in analyzing the presented text. The findings of the investigation have proved the applicability of the structure of conversation formulated by Burton (1980) in her model wit
... Show MoreThere is no doubt that the advertisement picture and the written text play a key role in the formation of the language of the communicative discourse as the main pillars of the design of commercial advertising and the main entrance for the advertising message awareness... Hence the researcher chose the title of her research (Integrative Relationship between the Picture and the Written Text in the Printed Commercial Advertisement) starting from following questions: What is the relationship between the picture and the written text in the printed commercial declaration? Is there functional, aesthetic and interactive integration between them?
&n
... Show MoreThe anatomical study of the epidermis leaflet for seven species and variety wild belonging to the genus Medicago L. species are: M. constricta Dur., M. coronata L., M. intertexta L., M. intertexta.var. ciliaris L., M. laciniata L., M. lupulina L., M. minima L. and M. sativa L. were studied, The search included epidermis characters and stomatal complexes addition to venation system in leaflets. It is revealed through the study, epidermis leaflet type Amphistomatic (the stomata spread on the upper and lower surface) as well as the presence of three types of stomatal complexes namely: Anisocytic (the guard cells surrounded by three unequal cell size), Anomocytic (not differential from subsidiary cells in epidermis) and Anomotetracytic (four ce
... Show MoreThe article aims to consider the concept of language metaphor in Russian and Arabic languages and the problem of metaphor functioning in language, since it is one of the most important figurative components of the structural organization of the text and an important means of reflecting the national culture of each people. and often in revealing the image of a metaphor one can feel the full flexibility of the language and its beauty.
This Research deals with estimation the reliability function for two-parameters Exponential distribution, using different estimation methods ; Maximum likelihood, Median-First Order Statistics, Ridge Regression, Modified Thompson-Type Shrinkage and Single Stage Shrinkage methods. Comparisons among the estimators were made using Monte Carlo Simulation based on statistical indicter mean squared error (MSE) conclude that the shrinkage method perform better than the other methods
As an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based
... Show MoreIn this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performa
... Show MoreCivil environment in nursing education enhances achieving learning outcomes. Addressing incivility can be crucial to improve academic achievements. The purpose of this study was examining the psychometric properties of the Arabic version of the Incivility in Nursing Education-Revised scale regarding nursing faculty.
This cross-sectional study conducted in five Arab countries using a convenience sampling st