In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate ( 75-86) that differentiates according to length of message and image resolution.
Comparative taxonomic study has been compeleted for the species of the. genus Centaurium Hill. of Iraq. So the morphological characters were studied comparatively for the first time form Iraqi materials. Stems, leaves ,infloresences and reproductive organs characters were a good taxonomic importance. Geographical distrtribution has been done for the species of the genus in addition to the environment information. The results were presented with schedules, tables, maps and micrographs. Taxonomic key for the species separation was also presented.
The Character is one of the elements of Storytelling, as it is the center of the plot, making it the basis on which the talk is about. The talk is the portrayal of the character while they’re acting; the novelist presents the character by interacting with the events, and the extent of the negative and positive appearing impact on the character. It should be noted that everyone has two personalities or more, each one appearing in a different position or situation. For instance, a man can be a father, a lover, an employee, a son or anyone else .. in another position, he might be a master, and in another a looser begging for the mercy of his humiliator, and sometimes he can show weakness to the one he loves, or show strength to his enemie
... Show MorePersuasion is a process studied by many scholars from the Greek time until the present. One persuasion strategy is metadiscourse, which refers to the writers' awareness of their text, the way they present themselves to the readers. The writers use metadiscourse markers to help the readers understand the real meaning of the text (Hyland 2005). The paper carries out a qualitative and quantitative analysis of the employment of persuasive metadiscourse markers in two English trade agreements and two Arabic agreements has provided in terms of Hyland's (2005) model of interactive and interactional markers. The aim is to find out whether all types of metadiscourse markers are used or not, and also to see whether English or Arabic employs
... Show MoreKnowledge of literature is an integral part of learning any spoken language. Learning literature expands the learner’s ability to understand the language studied. The field of literature is wide and cannot be limited to poems. It includes the etiquettes of a language and its environment, customs, and traditions etc. The Arabic language is among the languages with a centuries old history. It has achieved remarkable record accomplishments since the pre-Islamic era through to the present. This development is clear evidence of the great importance of literature in the revival of the Arabic language through different eras. As such, in Malaysia and other non-Arabic speaking countries, literature is taught in most schools, institutions and un
... Show Moreفقدان الزوج يعد حدثًا يغير حياة النساء، مما يضطرهن إلى السباحة في عالم جديد مليء بالحزن والوحدة والشكوك. مع الوقت، تطورت طريقة تصوير الأرامل بشكل كبير تعكس التغييرات في الآراء والقيم الثقافية. تُمثل الأرامل تقليديًا بأنهن ضعيفات ومعتمدات في الأدب، مستندة إلى افتراض أنهن يفتقدن الدعم المالي بعد وفاة شركائهن. ومع ذلك، فإن هذا التصوير لا يعترف بتأثير الأرملة على الرفاهية والهوية الشخصية. يسعى هذا النص إلى
... Show MoreThis paper presents a combination of enhancement techniques for fingerprint images affected by different type of noise. These techniques were applied to improve image quality and come up with an acceptable image contrast. The proposed method included five different enhancement techniques: Normalization, Histogram Equalization, Binarization, Skeletonization and Fusion. The Normalization process standardized the pixel intensity which facilitated the processing of subsequent image enhancement stages. Subsequently, the Histogram Equalization technique increased the contrast of the images. Furthermore, the Binarization and Skeletonization techniques were implemented to differentiate between the ridge and valley structures and to obtain one
... Show Moreorder to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs
In this paper, we designed a new efficient stream cipher cryptosystem that depend on a chaotic map to encrypt (decrypt) different types of digital images. The designed encryption system passed all basic efficiency criteria (like Randomness, MSE, PSNR, Histogram Analysis, and Key Space) that were applied to the key extracted from the random generator as well as to the digital images after completing the encryption process.