Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used to encode messages (characters, numbers, and special characters) to binary numbers. Three encoding ideas are proposed for this reason. At the same time, the second step is used Arabic language words to represent the obtained binary sequences to achieve the final secret text. The obtained results exhibited that sending a text containing secret messages in a different language (Arabic) cannot be suspicious when read.
The aim of this study was to measure the effectiveness of a proposed program to develop the creative abilities of the students of Tabuk University and its impact on the creative output of the NEOM project. The sample of the study consisted of (50) university students divided into two groups: an experimental group of 25 students who receive the proposed training program, and control group of (25) students.
To achieve these objectives, the researcher designed and developed tools to collect the required data, which were verified their validity and reliability.
The descriptive statistics of mean, standard deviations, correlation coefficient, T test for the associated sample were used in the analysis of the results of th
... Show MoreAddressed this research the impact of intelligence emotional dimensions of the main(self awareness, and self-management, and social awareness, and relationship management) in the performance excellence the university(performance optimization, and strategic development) this is by middling the styles decision making which are (rational and intuitive, and dependent, and spontaneous, and avoidant), and Go search of an intellectual dilemma raise fundamental questions revolve around the search was to answer those questions through a theoretical framework for search variables first and test models of the relationship and second through the impact six hypotheses President.The objective of the research to make sure the contr
... Show MoreCadmium has been known to be harmful to human healthy , manily Via contaminated drinking water , food supplies , tobacco and industrial pollutant . The aim of this study was to determine the toxicity of new Cadmium (II) complex ( Bis[ 5- ( P- nitrophenyl ) – ? 4 – Phenyl- 1,2,4- triazole -3- dithiocarbamatohydrazide] cadmium (II) Hydra ( 0.5) and compare it with anticancer drug cyclophosphamide ( CP) in female albino mice . This complex causes to several alterations in Enzymatic activity of Glutamate Pyruvate Transaminase (GPT) and Alkaline Phosphatase (ALP ) in three organs after the treatment of mice with different doses of a new cadmium (II) complex ( 0.09 / 0.25ml , 0.18/ 0.5ml and 0.25mg /0.7 ml /30 gm of mous
... Show MoreIn recent years, the consideration of natural products as anti-inflammatory and antioxidative treatments has more interested worldwide. Moreover, natural products are easily obtained and are relatively safe the Royal jelly (RJ) is one of them. The current study was carried to evaluate the effects of pregabalin (PGB) on physiological activity of sperms, reproductive hormones assay and some biochemical analysis. Forty (40) male albino rats (10-weeks-old) were divided into four groups (10 rats each): G1 (treated with PGB drug, 150 mg/kg B.wt (Lyrica-Pfizer-Pharmaceutical Industries), G2 (treated with RJ 1g/kg), G3 (treated with PGB drug and RJ together), and G4 control treated with norma
One of the most common procedures in oral surgery is the removal of impacted mandibular third molars, often followed by pain, swelling, alveolitis, and trismus. Purpose. To compare the outcomes of the intrasocket application of 1% hyaluronic acid oral gel (HA) and advanced platelet-rich fibrin (A-PRF) on the expected postoperative complications, pain, swelling, and trismus follow the surgical extraction of the impacted mandibular third molar. Material and Methods. A randomized controlled trial was conducted at the Oral and Maxillofacial Surgery Unit, Dental Teaching Hospital. Healthy patients who required surgical removal of the impacted mandibular third molar were divided randomly into three groups. The extraction site of the group
... Show MoreData compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreIn this paper solar radiation was studied over a region of Baghdad (Latitude 33.3o and longitude 44.4o). The two parts of global solar radiation: diffuse and direct solar radiation were estimated depending on the clearance index of measured data (Average Monthly mean global solar radiation). Metrological data of measured (average monthly mean diffuse and direct solar radiation) were used to comparison the results and show the agreement between them. Results are determined by applying Liu and Jordan two models (1960). Excel 2007program is used in calculation, graphics and comparison the results.
Iraq has seen many changes at the social, economic and political levels. This led to cause many shifts in the structure of its society and imposed great challenges reflected in the behavior and awareness of that society in general and youth in particular.
Those changes made the Iraqi society undergoing the transformation of value and culture aspects formed a political awareness that caused cultural and political diversity within the family and society. A greater openness to the outside world caused by the communication revolution, as the world has witnessed during the past two decades, has helped in making that change. Iraq had its share of media and political openness, which were included after the US occupation in 2003. As a re
... Show MoreAn experiment was conducted to study the effect of the sprayer type according to the source of power and the size of the spray nozzle concerning the quality of the spray produced and fuel consumption.Two types of sprayers were used: a conventional boom sprayer (S1) and a modified (electrified) boom sprayer (S2), along with three sizes of the XR TeeJet 110 spray nozzle (N). The following technical performance indicators were examined: Density of coverage (drops/cm2) using ImageJ software, a 600dpi business card scanner, specifically the ScanShell 800N by CSSN, Inc, and water-sensitive paper (WSP), rate of spray nozzles discharge (ml/min), and fuel consumption (liters/hectare) using a c