Preferred Language
Articles
/
fRbmvYoBVTCNdQwCDaS4
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used to encode messages (characters, numbers, and special characters) to binary numbers. Three encoding ideas are proposed for this reason. At the same time, the second step is used Arabic language words to represent the obtained binary sequences to achieve the final secret text. The obtained results exhibited that sending a text containing secret messages in a different language (Arabic) cannot be suspicious when read.

Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
Schema Theory and Text- worlds: A Cognitive Stylistic Analysis of Selected Literary Texts
...Show More Authors

Cognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections.        Schema and text world theories are useful tools in cognitive stylistic studies. The reader's perception o

... Show More
Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Oct 05 2010
Journal Name
Journal Of College Of Education For Women
Conversation Analysis of Forum: a Selected Text from Paul S. Kemp Online Journal
...Show More Authors

Language as a means of communication has long been the concern of many conversation analysts in their studies such as: Sacks et al. (1974), Schegloff et al. (1977), Duncan (1972), Grice (1975) and Burton (1980). Burton has attempted analyzing the first ten transitions of the play “The Dumb Waiter” for mere a presentation of her approach. This paper aims at analyzing the conversational structure of forum on the subject of literary fiction and genre fiction by applying Burton’s model (1980) of analysis to answer the question to what extent this model is applicable in analyzing the presented text. The findings of the investigation have proved the applicability of the structure of conversation formulated by Burton (1980) in her model wit

... Show More
Preview PDF
Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
Integrative Relationship between the Picture and the Written Text in the Commercial Advertisement
...Show More Authors

There is no doubt that the   advertisement picture  and the written text play  a key role in the formation of the language of the communicative discourse as the main pillars of the design of commercial advertising and the main entrance for the  advertising message awareness... Hence the researcher chose the title of her research (Integrative Relationship between the Picture and the Written Text in the Printed Commercial Advertisement) starting from following questions: What is the relationship between the picture and the written text in the printed commercial declaration? Is there functional, aesthetic and interactive integration between them?

          &n

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 03 2017
Journal Name
Baghdad Science Journal
Study of epidermis characters and venation of certain species of Medicago L. in Leguminosae (Fabaceae) family in Iraq
...Show More Authors

The anatomical study of the epidermis leaflet for seven species and variety wild belonging to the genus Medicago L. species are: M. constricta Dur., M. coronata L., M. intertexta L., M. intertexta.var. ciliaris L., M. laciniata L., M. lupulina L., M. minima L. and M. sativa L. were studied, The search included epidermis characters and stomatal complexes addition to venation system in leaflets. It is revealed through the study, epidermis leaflet type Amphistomatic (the stomata spread on the upper and lower surface) as well as the presence of three types of stomatal complexes namely: Anisocytic (the guard cells surrounded by three unequal cell size), Anomocytic (not differential from subsidiary cells in epidermis) and Anomotetracytic (four ce

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Jun 15 2022
Journal Name
Linguistics And Translation Studies
Metaphor as a method of forming the lexical meaning of a word (on the material of Russian and Arabic languages)
...Show More Authors

The article aims to consider the concept of language metaphor in Russian and Arabic languages and the problem of metaphor functioning in language, since it is one of the most important figurative components of the structural organization of the text and an important means of reflecting the national culture of each people. and often in revealing the image of a metaphor one can feel the full flexibility of the language and its beauty.

Preview PDF
Publication Date
Wed Apr 25 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Reliability Estimation for the Exponential Distribution Based on Monte Carlo Simulation
...Show More Authors

        This Research deals with estimation the reliability function for two-parameters Exponential distribution, using different estimation methods ; Maximum likelihood, Median-First Order Statistics, Ridge Regression, Modified Thompson-Type Shrinkage and Single Stage Shrinkage methods. Comparisons among the estimators were made using Monte Carlo Simulation based on statistical indicter mean squared error (MSE) conclude that the shrinkage method perform better than the other methods

View Publication Preview PDF
Crossref
Publication Date
Wed Feb 10 2016
Journal Name
Scientific Reports
Experimental demonstration on the deterministic quantum key distribution based on entangled photons
...Show More Authors

As an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based

... Show More
View Publication
Scopus (16)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Fri Feb 04 2022
Journal Name
Neuroquantology
Detecting Damaged Buildings on Post-Hurricane Satellite Imagery based on Transfer Learning
...Show More Authors

In this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performa

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Nursing Education Scholarship
Incivility among Arabic-speaking nursing faculty: testing the psychometric properties of the Arabic version of incivility in nursing education-revised
...Show More Authors
Abstract<sec id="j_ijnes-2021-0020_abs_001"> <title>Objectives

Civil environment in nursing education enhances achieving learning outcomes. Addressing incivility can be crucial to improve academic achievements. The purpose of this study was examining the psychometric properties of the Arabic version of the Incivility in Nursing Education-Revised scale regarding nursing faculty.

Methods

This cross-sectional study conducted in five Arab countries using a convenience sampling st

... Show More
View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref