Preferred Language
Articles
/
fRbmvYoBVTCNdQwCDaS4
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used to encode messages (characters, numbers, and special characters) to binary numbers. Three encoding ideas are proposed for this reason. At the same time, the second step is used Arabic language words to represent the obtained binary sequences to achieve the final secret text. The obtained results exhibited that sending a text containing secret messages in a different language (Arabic) cannot be suspicious when read.

Publication Date
Thu Feb 20 2025
Journal Name
Arab World English Journal For Translation And Literary Studies
The Impact of Culture in Translating English Idioms into Arabic
...Show More Authors

This study sought to understand how critical cultural awareness was in translating English idioms into Arabic, particularly in political news where clarity and precision are paramount. The challenges that arise from the linguistic and cultural disparities between the two languages include differences in metaphor, image, and cultural reference. The study demonstrates, through the lens of Skopos Theory, how efficient translation relies on the function and intent of the text taking precedence over word-for-word equivalence and cultural context. Overall, the study establishes the need to transform idioms so that they better align with what is appropriate given the expectations of the audience. The results highlight the importance of inn

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 15 2022
Journal Name
Alustath Journal For Human And Social Sciences
The Impact of Mind and Informational Strategy on the ‎Achievement of the Second Intermediate Students in the Grammar ‎of Arabic Language
...Show More Authors

The aim of the current research is to recognizing the impact of mind and informational strategy on the achievement with the second intermediate students in the grammar of arabic language, the researcher used a partial-set experimental design and intentionally selected a sample out of the second intermediate class from (AL- Markazya Intermediate school) in the district of Hilla, affiliated which belongs to General Directorate of Babylon Education in the year (2020-2021) for applying the experiment. The sample was composed of (50) students, (25) ones for each group, the experimental group and normal one. The researcher balanced between the two groups in various changes including: (the chronological age counted by months, the academic achie

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 24 2021
Journal Name
Journal Of The College Of Education For Women
Arabic Language Teachers’ Training Needs for Implementing Cognitive Trips Strategy when Teaching Arabic Language Courses in the Kingdom of Saudi Arabia: أمل ناصر الحربي, و وفاء العويضي
...Show More Authors

The present work focuses on examining the strategy of cognitive trips and the Arabic language teachers’ training needs of such a strategy when teaching Arabic language courses in the Saudi Arabia Kingdom. To achieve the objective of the study, and check whether this strategy is used in lesson planning, lesson teaching, or lesson assessment, a descriptive approach and a questionnaire have been adopted. The researchers used a number of statistical tools, and chose a purposive sample, which consists of (58) Arabic language teachers from Saudi Arabia Kingdom. Results have shown that the training needs of Arabic language teachers for implemining the strategy of cognitive journeys while teaching Arabic language courses came in the following

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
The Difficulties of the opening text between changing and collecting reading in poem (city without rain): The Difficulties of the opening text between changing and collecting reading in poem (city without rain)
...Show More Authors

Abstract
This research deals with the technical of opening text during the critical
study about the poem of Al- ssiyab which is named ( city with out rain)
We chose this poem also to make connection with the western critical
theories.
Our study aims to explain the act of opening texts and critics and its
methods and directions in modern Arabic poetry.
It also aims to show the differences in the point of view between critics
and poetries.
The research depends on dimension vision of selective, and descriptive.

View Publication Preview PDF
Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Educational And Psychological Researches
Recent trends of Arabic language teaching methods in contemporary education environment
...Show More Authors

Arabic language the timeless language of the Qur'an ((I made it read Arabic you may understand)) (Al-Zukhruf No 3). It is a way to express his thoughts and feelings and capable of giving constant absorbed the needs of the times and meet the General requirements and interactive needs of life to achieve social and intellectual aspects.    

The aim of current research to identify what teaching the contemporary trends in teaching, what the nature of knowledge and teaching methods, how do you rate the modern Arabic language teaching methods, the criteria for evaluating the effectiveness of teaching where the researcher has reached some recommendations: 1. establish the basics of environmental ed

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 31 2017
Journal Name
College Of Islamic Sciences
The saying of Al-Azhar in the fatwas with it from the words of Imam Zafar (may God have mercy on him) by Imam Pirizadeh Al-Hanafi (d. 1099 AH)
...Show More Authors

It is no secret to anyone that studying and investigating books of jurisprudence, despite their suffering, is a pleasure that cannot be compared to pleasure, and it has benefits and importance that cannot be limited and summed up, and it has great fruits that researchers and students of knowledge reap, as well as enriching libraries with jurisprudential material, after dusting them and taking them out to the light of libraries to be seen. Researchers and scholars, generation after generation, so that this nation can benefit from this pioneering intellectual and scientific product that was written for us by our first ancestors of working scholars who enriched human civilization with this scientific material, which has become a beacon guid

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 02 2012
Journal Name
Baghdad Science Journal
Synthesis and Characterization of Derivatives Based on 4, - Dimercaptobiphenyl
...Show More Authors

Starting from 4, - Dimercaptobiphenyl, a variety of phenolic Schiff bases (methylolic, etheric, epoxy) derivatives have been synthesized. All proposed structure were supported by FTIR, 1H-NMR, 13C-NMR Elemental analysis all analysis were performed in center of consultation in Jordan Universty.

View Publication Preview PDF
Crossref
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More
Publication Date
Thu Apr 25 2019
Journal Name
Engineering And Technology Journal
Improvement of Harris Algorithm Based on Gaussian Scale Space
...Show More Authors

Features is the description of the image contents which could be corner, blob or edge. Corners are one of the most important feature to describe image, therefore there are many algorithms to detect corners such as Harris, FAST, SUSAN, etc. Harris is a method for corner detection and it is an efficient and accurate feature detection method. Harris corner detection is rotation invariant but it isn’t scale invariant. This paper presents an efficient harris corner detector invariant to scale, this improvement done by using gaussian function with different scales. The experimental results illustrate that it is very useful to use Gaussian linear equation to deal with harris weakness.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Network Performance Analysis Based on Network Simulator NS-2.
...Show More Authors

     NS-2 is a tool to simulate networks and events that occur per packet sequentially based on time and are widely used in the research field. NS-2 comes with NAM (Network Animator) that produces a visual representation it also supports several simulation protocols. The network can be tested end-to-end. This test includes data transmission, delay, jitter, packet-loss ratio and throughput. The Performance Analysis simulates a virtual network and tests for transport layer protocols at the same time with variable data and analyzes simulation results based on the network simulator NS-2.

View Publication Preview PDF
Crossref