In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate ( 75-86) that differentiates according to length of message and image resolution.
The Character is one of the elements of Storytelling, as it is the center of the plot, making it the basis on which the talk is about. The talk is the portrayal of the character while they’re acting; the novelist presents the character by interacting with the events, and the extent of the negative and positive appearing impact on the character. It should be noted that everyone has two personalities or more, each one appearing in a different position or situation. For instance, a man can be a father, a lover, an employee, a son or anyone else .. in another position, he might be a master, and in another a looser begging for the mercy of his humiliator, and sometimes he can show weakness to the one he loves, or show strength to his enemie
... Show MoreThe revolution of multimedia has been a driving force behind fast and secured data transmission techniques. The security of image information from unapproved access is imperative. Encryptions technique is used to transfer data, where each kind of data has its own special elements; thus various methods should to be used to conserve distributing the image. This paper produces image encryption improvements based on proposed an approach to generate efficient intelligent session (mask keys) based on investigates from the combination between robust feature for ECC algebra and construction level in Greedy Randomized Adaptive Search Procedure (GRASP) to produce durable symmetric session mask keys consist of ECC points. Symmetric behavior for ECC
... Show MoreKnowledge of literature is an integral part of learning any spoken language. Learning literature expands the learner’s ability to understand the language studied. The field of literature is wide and cannot be limited to poems. It includes the etiquettes of a language and its environment, customs, and traditions etc. The Arabic language is among the languages with a centuries old history. It has achieved remarkable record accomplishments since the pre-Islamic era through to the present. This development is clear evidence of the great importance of literature in the revival of the Arabic language through different eras. As such, in Malaysia and other non-Arabic speaking countries, literature is taught in most schools, institutions and un
... Show MorePersuasion is a process studied by many scholars from the Greek time until the present. One persuasion strategy is metadiscourse, which refers to the writers' awareness of their text, the way they present themselves to the readers. The writers use metadiscourse markers to help the readers understand the real meaning of the text (Hyland 2005). The paper carries out a qualitative and quantitative analysis of the employment of persuasive metadiscourse markers in two English trade agreements and two Arabic agreements has provided in terms of Hyland's (2005) model of interactive and interactional markers. The aim is to find out whether all types of metadiscourse markers are used or not, and also to see whether English or Arabic employs
... Show MoreComparative taxonomic study has been compeleted for the species of the. genus Centaurium Hill. of Iraq. So the morphological characters were studied comparatively for the first time form Iraqi materials. Stems, leaves ,infloresences and reproductive organs characters were a good taxonomic importance. Geographical distrtribution has been done for the species of the genus in addition to the environment information. The results were presented with schedules, tables, maps and micrographs. Taxonomic key for the species separation was also presented.
A special methodology for adding a watermark for colored (RGB) image is formed and adding the wavelet transform as a tool during this paper. The watermark is added into two components. The primary one is by taking the key that contain associate eight range from (0...7) every range in it determines the actual bit position in specific component of canopy image. If that bit is analogous to the bit in watermark, (0) are hold on within the Least Significant Bit (LSB) of the watermarked image; otherwise (1) are hold on. The other is that it will add multiple secret keys victimization shift and rotate operations. The watermark is embedded redundantly over all extracted blocks in image to extend image protection. This embedding is completed with
... Show MoreThis study investigates the phonological adaptation of diphthongs within English loanwords in Iraqi Arabic (IA). In contrast to earlier small-scale descriptive studies, this study used quantitative content analysis to analyse 346 established loanwords collected through document review and direct observation to determine the diphthong adaptation patterns involved in the nativisation of English loanwords by native speakers of IA. Content analysis results revealed that most GB diphthong adaptations in English loanwords in IA occur in systematic patterns and thus may be ascribed to particular aspects in both L1 and L2 phonological systems. More specifically, the results indicate that the IA output forms tend to maintain the features of the GB i
... Show MoreThis paper presents a combination of enhancement techniques for fingerprint images affected by different type of noise. These techniques were applied to improve image quality and come up with an acceptable image contrast. The proposed method included five different enhancement techniques: Normalization, Histogram Equalization, Binarization, Skeletonization and Fusion. The Normalization process standardized the pixel intensity which facilitated the processing of subsequent image enhancement stages. Subsequently, the Histogram Equalization technique increased the contrast of the images. Furthermore, the Binarization and Skeletonization techniques were implemented to differentiate between the ridge and valley structures and to obtain one
... Show More