Preferred Language
Articles
/
fRbmvYoBVTCNdQwCDaS4
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used to encode messages (characters, numbers, and special characters) to binary numbers. Three encoding ideas are proposed for this reason. At the same time, the second step is used Arabic language words to represent the obtained binary sequences to achieve the final secret text. The obtained results exhibited that sending a text containing secret messages in a different language (Arabic) cannot be suspicious when read.

Publication Date
Tue Nov 01 2022
Journal Name
Alustath
Metrical Phonology in Classical English and Arabic Poetry: A Contrastive Study
...Show More Authors

One of the prominent goals of Metrical Phonology Theory is providing stress of poetry on the syllable-, the foot-, and the phonological word- levels. Analysing poetry is one of the most prominent and controversial issues for the involved number and types of syllables, feet, and meters are stable in poetry compared to other literary texts. The prosodic seeds of the theory have been planted by Firth (1948) in English, while in Arabic يديهارفلا in the second half of the eighth century (A.D.) has done so. Investigating the metrical structure of poetry has been conducted in various languages, whereas scrutinising the metrical structure of English and Arabic poetry has received little attention. This study aims at capturing the

... Show More
Publication Date
Thu Dec 01 2022
Journal Name
Journal Of Engineering
The Optimum Reinforcement Layer Number for Soil under the Ring Footing Subjected to Inclined Load
...Show More Authors

The primary components of successful engineering projects are time, cost, and quality. The use of the ring footing ensures the presence of these elements. This investigation aims to find the optimum number of geogrid reinforcement layers under ring footing subjected to inclined loading. For this purpose, experimental models were used. The parameters were studied to find the optimum geogrid layers number, including the optimum geogrid layers spacing and the optimum geogrid layers number. The optimum geogrid layers spacing value is 0.5B. And as the load inclination angle increased, the tilting and the tilting improvement percent for the load inclination angles (5°,10°,15°) are (40%,28%, and 5%) respectively. The reduction percent o

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Journal Of Engineering
The Optimum Reinforcement Layer Number for Soil under the Ring Footing Subjected to Inclined Load
...Show More Authors

The primary components of successful engineering projects are time, cost, and quality. The use of the ring footing ensures the presence of these elements. This investigation aims to find the optimum number of geogrid reinforcement layers under ring footing subjected to inclined loading. For this purpose, experimental models were used. The parameters were studied to find the optimum geogrid layers number, including the optimum geogrid layers spacing and the optimum geogrid layers number. The optimum geogrid layers spacing value is 0.5B. And as the load inclination angle increased, the tilting and the tilting improvement percent for the load inclination angles (5°,10°,15°) are (40%,28%, and 5%) respectively. The reduction percent of the

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Jan 24 2019
Journal Name
Journal Of Education College Wasit University
“They’ve damaged your uniqueness”: Technology as a Source of Dystopia in Caryl Churchill’s A Number
...Show More Authors

This study focuses on the impact of technology on creating a dystopian world as presented by the English playwright Caryl Churchill in her play A Number (2002). This dramatic work came as a reaction to the most crucial and valuable turning point in the scientific achievements of human engineering, namely, the cloning of the sheep called Dolly. Therefore, A Number is a play that presents an analytical stage for imagining the biotechnological and scientific future. This dramatic vignette captures the playwright’s fears towards the abnormal progress of technology and science and how far such technological progress affects human relationships and identity. It also portrays how technological progress results in the feeling of a lack of

... Show More
View Publication
Crossref
Publication Date
Sun Dec 30 2018
Journal Name
2018 Computing In Cardiology Conference (cinc)
Theoretical and Experimental Reflection Coefficients in Flexible Tubes as a Function of the Mach Number
...Show More Authors

The standard formulation of Wave Intensity Analysis (WIA) assumes that the flow velocity (U) in the conduit is <;<; the velocity of propagation of waves (c) in the system, and Mach number, M=U/c, is negligible. However, in the large conduit arteries, U is relatively high due to ventricular contraction and c is relatively low due to the large compliance; thus M is > 0, and may not be ignored. Therefore, the aim of this study is to identify experimentally the relationship between M and the reflection coefficient in vitro. Combinations of flexible tubes, of 2 m in length with isotropic and uniform circular cross sectional area along their longitudinal axes, were used to present mother and daughter tubes to produce a range of reflection coeffic

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Jun 02 2023
Journal Name
East European Journal Of Physics
A Study of the Weakly Bound Structure of Nuclei Around the Magic Number N=50
...Show More Authors

An investigation of the quadrupole deformation of Kr, Sr, Zr, and Mo isotopes has been conducted using the HFB method and SLy4 Skyrme parameterization. The primary role of occupancy of single particle state 2d5/2 in the existence of the weakly bound structure around N=50 is probed. Shell gaps are performed using a few other calculations for the doubly magic number 100Sn using different Skyrme parameterizations. We explore the interplays among neutron pairing strength and neutron density profile in two dimensions, along with the deformations of 100Sn.

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Science And Research (ijsr)
Generalization of Rough Set Theory Using a Finite Number of a Finite d. g.'s
...Show More Authors

This paper is concerned with introducing and studying the new approximation operators based on a finite family of d. g. 'swhich are the core concept in this paper. In addition, we study generalization of some Pawlak's concepts and we offer generalize the definition of accuracy measure of approximations by using a finite family of d. g. 's.

View Publication Preview PDF
Publication Date
Mon Aug 01 2011
Journal Name
International Journal Of Research And Reviews In Computer Science
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Sun Apr 01 2018
Journal Name
Al–bahith Al–a'alami
The uses used in the political implications of Arabic-speaking foreign website
...Show More Authors

This research is intended to high light the uses of political content in foreign Arabic / speaking websites, such as “ CNN “ and” Euro News“, The research problem stems from the main question: What is the nature of the use of the websites in the political content provided through them? A set of sub-questions that give the research aspects and aims to achieve a set of objectives , including the identification of topics that included , the political content provided through , the sample sites during the time period for analysis and determine that the study uses descriptive research based on the discovery of the researcher, describing it accurately and defining the relations between the components.
The research conducted the des

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Performance of Case-Based Reasoning Retrieval Using Classification Based on Associations versus Jcolibri and FreeCBR: A Further Validation Study
...Show More Authors

View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref