Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used to encode messages (characters, numbers, and special characters) to binary numbers. Three encoding ideas are proposed for this reason. At the same time, the second step is used Arabic language words to represent the obtained binary sequences to achieve the final secret text. The obtained results exhibited that sending a text containing secret messages in a different language (Arabic) cannot be suspicious when read.
How I was eager to research the ruling on three of the most dangerous types to Islam and Muslims (the heretic, the sorcerer, the innovator, and related terms).
Because it is the most dangerous deadly disease that destroys the hearts of Muslims, and may even expel a Muslim from the circle of Islam, and how many Muslims have done or committed such a thing without knowing it. Indeed, how many Muslims have left Islam and whose wife has abandoned him without realizing it, and among them are those who have committed it without knowing it. As well as related words associated with heresy.( )
Because people debated such matters between extremists and lenient ones, most of whom were extremists, and they did not reach a conclusion. So I decid
An anatomical study was carried out at the College of Agricultural Engineering Sciences, University of Baghdad, in 2017, on lupine crop (Lupinus albus) as a comparison guide of three seed weights of three lupine cultivars viz. ‘Giza-1’, ‘Giza-2’ and ‘Hamburg’. The nested design was used with four replications. The results showed that cultivars had a significant effect on stem anatomical traits. ‘Hamburg’ cultivar recorded the highest stem diameter, cortex thickness and xylem vascular diameter, while cultivar ‘Giza-1’ recorded the lowest values for the same traits as well as the highest collenchyma layer thickness, vascular bundle thickness, and xylem thickness. Cultivar ‘Giza-2’ recorded the lowest vascular b
... Show MoreAn anatomical study was carried out at the College of Agricultural Engineering Sciences, University of Baghdad, in 2017, on lupine crop (Lupinus albus) as a comparison guide of three seed weights of three lupine cultivars viz. ‘Giza-1’, ‘Giza-2’ and ‘Hamburg’. The nested design was used with four replications. The results showed that cultivars had a significant effect on stem anatomical traits. ‘Hamburg’ cultivar recorded the highest stem diameter, cortex thickness and xylem vascular diameter, while cultivar ‘Giza-1’ recorded the lowest values for the same traits as well as the highest collenchyma layer thickness, vascular bundle thickness, and xylem thickness. Cultivar ‘Giza-2’ recorded the lowest vascular bundle th
... Show MoreFour localities were selected in Euphrates River and Ramadi sewage treatment plant to collect water samples monthly during the period between October 2001 to July 2002 . Total cell count of phytoplankton and its physico- chemical concentrations were determined . The study aimed to demonstrate the effect of Ramadi sewage treatment plant on Euhprates River . It is concluded that the sewage had an dilution effect for the total hardness , total alkalinity , electrical conductivity and salinity of Euphrates River , but it is also caused in the presence of a contaminated area . This was cleared from the depletion of dissolved oxygen and high values of biological oxygen demand with lower valuse of pH in this area . The water of Euphrates
... Show MoreGeneral propositions have dealt with various indicators and features that frame and describe basic architectural concepts, and from those concepts, the concept of identity will be presented here, which represents the nerve of intellectual vision of the state of architecture development, transformation and change. Due to its deep intellectual basis, it was necessary to study multiple features, especially the achievement feature that was considered a major stage describing the nature of change and shift related to the achievement of concept and its role in the development of the architectural field . &nb
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreMR Younus, Nasaq Journal, 2022
يعد هذا النص أحد النصوص المسمارية المصادرة التي بحوزة المتحف العراقي، ويحمل الرقم المتحفي (235869)، قياساته )12،7x 6x 2،5سم). يتضمن مدخولات كميات من الشعير،أرخ النص الى عصر أور الثالثة (2012-2004 ق.م) و يعود الى السنة الثالثة من حكم الملك أبي-سين (2028-2004 ق.م)،أن الشخصية الرئيسة في هذا النص هو)با-اَ-كا مسمن الماشية( من مدينة أري-ساكرك، ومقارنته مع النصوص المسمارية المنشورة التي تعود الى أرشيفه يبلغ عددها (196) نصاً تضمنت نشاطاته م
... Show MoreAll modern critical approaches attempt to cover the meanings and overtones of the text, claiming that they are better than others in the analysis and attainment of the intended meanings of the text. The structural approach claims to be able to do so more than any other modern critical approach, as it claimed that it is possible to separate what is read from the reader, on the presumed belief that it is possible to read the text with a zero-memory. However, the studies in criticism of criticism state that each of these approaches is successful in dealing with the text in one or more aspects while failing in one or more aspects. Consequently, the criticism whether the approach possesses the text, or that the text rejects this possession, r
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show More