Preferred Language
Articles
/
fRbmvYoBVTCNdQwCDaS4
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used to encode messages (characters, numbers, and special characters) to binary numbers. Three encoding ideas are proposed for this reason. At the same time, the second step is used Arabic language words to represent the obtained binary sequences to achieve the final secret text. The obtained results exhibited that sending a text containing secret messages in a different language (Arabic) cannot be suspicious when read.

Publication Date
Sat Aug 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Text hiding in text using invisible character
...Show More Authors

Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jan 31 2025
Journal Name
Joiv : International Journal On Informatics Visualization
RC5 Performance Enhancement Based on Parallel Computing
...Show More Authors

This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Mar 22 2012
Journal Name
مجلة كلية التربية الاساسية
The effect of NPK fertilize on some physiological characters of Apium graveolens
...Show More Authors

The experiment was carried out to study the effect oftwo concentration of NPK 0.25 and 0.50g/kg soil on some physiological characters of Apium graveolens. The results showed that the both concentration increased percentage of germination, plant height, Length of roots, roots diameter, absolute growth rate (AGR), relative growth rate (RGR) and percentage of N, P and K in plants

Publication Date
Sat Feb 03 2018
Journal Name
Chinese Journal Of Physics
A true random number generator based on the photon arrival time registered in a coincidence window between two single-photon counting modules
...Show More Authors

True random number generators are essential components for communications to be conconfidentially secured. In this paper a new method is proposed to generate random sequences of numbers based on the difference of the arrival times of photons detected in a coincidence window between two single-photon counting modules

View Publication
Scopus (20)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Sun Dec 29 2024
Journal Name
Muthanna Journal Of Pure Science
Two-Fold Cryptography: Enhancing Image Security with Henon Map
...Show More Authors

This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.

View Publication Preview PDF
Crossref
Publication Date
Thu Jun 10 2010
Journal Name
Iraqi Journal Of Laser
Generation of Weak Coherent Pulses for Quantum Cryptography Systems
...Show More Authors

This work is a trial to ensure the absolute security in any quantum cryptography (QC) protocol via building an effective hardware for satisfying the single-photon must requirement by controlling the value of mean photon number. This was approximately achieved by building a driving circuit that provide very short pulses (≈ 10 ns) for laser diode -LD- with output power of (0.7-0.99mW) using the available electronic components in local markets. These short pulses enable getting faint laser pulses that were further attenuated to reach mean photon number equal to 0.08 or less.

View Publication Preview PDF
Publication Date
Wed Nov 14 2012
Journal Name
Journal Of The College Of Basic Education,
Effect of mycorrhiza ( Glomus mosseae ) and superphosphate on physiological characters of Hordeum vulgare
...Show More Authors

Abstract An experiment was conducted to study the effect of Glomus mosseae and two concentration (21 and 42%) of super phosphate. They used either to be separated or together with inoculation of G. mosseae on physiological characters of Horeum Vulagera . The results showed that all treatment affected significantly especially super phosphate at the above concentration together with G. mosseae. The effects appeared as an increase in plant height , leaves area , dry weight of total plant , stem dry weight , leaves dry weight , tiller’s number , flag leaf area , dry weight of flag and also increased in CGR , RGR , RGR- NAR , LAI . The yield component increased in number of spikes, number of spikelet’s / spike, number of grain / spike, weigh

... Show More
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
Semantic relations in text and translation: Die semantischen Relationen im Text und Übersetzung
...Show More Authors

       Based on the German language department’s theoretical and practical aspects as well as educational programs, the present study discusses the semantic relations in text sentences and their role in the science of translation.  Through clarifying the semantic relationship between the text sentence and the methods used to express a news item, a situation or an occurrence and through the statement of the multiple theoretical semantic structures of the text’s construction and interrelation, a translator can easily translate a text into the target language.

        It is known that language learners face multiple difficulties in writing and creating an inte

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 02 2019
Journal Name
Journal Of The College Of Languages (jcl)
Spacio-Temporal Relations in the Translated Text in Both Russian and Arabic: Временные и пространственные отношения с текстом перевода на русском и арабском языках
...Show More Authors

 The present paper(Spacio-Temporal Relations in the Translated Text in Both Russian and Arabic) focuses on the spacio-temporal effect in the translated text; it is possible to compose the translation text simultaneously with the  process of the composing the original text. This is carried out during the simultaneous consecutive translation. And, the time and place of composing the translation might greatly differ from the time and place of composing the original textt. The translator may tackle a text of an ancient time and written in a language which might have changed, and may thus appear as another language where the author might have talked on behalf of a people who had lived or are living in apparently different geographic

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 21 2019
Journal Name
Journal Of The College Of Education For Women
Translation of Polysemous Words in Harry Potter
...Show More Authors

The paper pays attention to the polysemous words Harry Potter (HP). In this story, the present study exams some picking polysemic words to the extent that the translators of HP prevail to render the proposed significance as per the setting of the first content. Obviously, the picking translators in this examination were not mindful of the wonder of polysemy in the HP. They embrace a strict interpretation methodology to pass on the greater part of the polysemic sense. The method of data collection is divided into two stages. Firstly, determining the situational context of the fantasy and identifying the polysemic sense to clearly make all the contextual meanings of the source text. Secondly, reviewing the selected translation to

... Show More
View Publication Preview PDF
Crossref