Preferred Language
Articles
/
jih-1433
Combining a Hill Encryption Algorithm and LSB Technique With Dispersed Way for Securing Arabic and English Text Messages Hidden in Cover Image
...Show More Authors

         In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate      ( 75-86) that differentiates according to  length of message and image resolution.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
PHARAOH'S CHARACTER BETWEEN THE QUR'ANIC TEXT AND THE ARABIC NOVEL: (Naguib Mahfouz's Pharaonic Novels as a Model)
...Show More Authors

The Character is one of the elements of Storytelling, as it is the center of the plot, making it the basis on which the talk is about. The talk is the portrayal of the character while they’re acting; the novelist presents the character by interacting with the events, and the extent of the negative and positive appearing impact on the character. It should be noted that everyone has two personalities or more, each one appearing in a different position or situation. For instance, a man can be a father, a lover, an employee, a son or anyone else .. in another position, he might be a master, and in another a looser begging for the mercy of his humiliator, and sometimes he can show weakness to the one he loves, or show strength to his enemie

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 18 2022
Journal Name
Iraqi Journal Of Science
Image Encryption Based on Intelligent Session Mask Keys
...Show More Authors

The revolution of multimedia has been a driving force behind fast and secured data transmission techniques. The security of image information from unapproved access is imperative. Encryptions technique is used to transfer data, where each kind of data has its own special elements; thus various methods should to be used to conserve distributing the image. This paper produces image encryption improvements based on proposed an approach to generate efficient intelligent session (mask keys) based on investigates from the combination between robust feature for ECC algebra and construction level in Greedy Randomized Adaptive Search Procedure (GRASP) to produce durable symmetric session mask keys consist of ECC points. Symmetric behavior for ECC

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
The Impact of Arabic Poetry and Proverbs in Teaching English to Non-Native Speakers
...Show More Authors

Knowledge of literature is an integral part of learning any spoken language. Learning literature expands the learner’s ability to understand the language studied. The field of literature is wide and cannot be limited to poems. It includes the etiquettes of a language and its environment, customs, and traditions etc. The Arabic language is among the languages with a centuries old history. It has achieved remarkable record accomplishments since the pre-Islamic era through to the present. This development is clear evidence of the great importance of literature in the revival of the Arabic language through different eras. As such, in Malaysia and other non-Arabic speaking countries, literature is taught in most schools, institutions and un

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 14 2022
Journal Name
Journal Of The College Of Languages (jcl)
Effective Metadiscourse Strategies in Texts of English and Arabic Trade Agreements to attain persuasion
...Show More Authors

Persuasion is a process studied by many scholars from the Greek time until the present. One persuasion strategy is metadiscourse, which refers to the writers' awareness of their text, the way they present themselves to the readers. The writers use metadiscourse markers to help the readers understand the real meaning of the text (Hyland 2005).  The paper carries out a qualitative and quantitative analysis of the employment of persuasive metadiscourse markers in two English trade agreements and two Arabic agreements has provided in terms of Hyland's (2005) model of interactive and interactional markers. The aim is to find out whether all types of metadiscourse markers are used or not, and also to see whether English or Arabic employs

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Mar 03 2013
Journal Name
Baghdad Science Journal
Species of Centaurium Hill. in Iraq and its geographical distribution
...Show More Authors

Comparative taxonomic study has been compeleted for the species of the. genus Centaurium Hill. of Iraq. So the morphological characters were studied comparatively for the first time form Iraqi materials. Stems, leaves ,infloresences and reproductive organs characters were a good taxonomic importance. Geographical distrtribution has been done for the species of the genus in addition to the environment information. The results were presented with schedules, tables, maps and micrographs. Taxonomic key for the species separation was also presented.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Engineering And Technology Journal
Face Retrieval Using Image Moments and Genetic Algorithm
...Show More Authors

Publication Date
Wed May 10 2017
Journal Name
Australian Journal Of Basic And Applied Sciences
Block-based Image Steganography for Text Hiding Using YUV Color Model and Secret Key Cryptography Methods
...Show More Authors

Preview PDF
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Embedding a Digitized Watermark Upon Colored Image Using Wavelet Transform with Comparative Technique
...Show More Authors

A special methodology for adding a watermark for colored (RGB) image is formed and adding the wavelet transform as a tool during this paper. The watermark is added into two components. The primary one is by taking the key that contain associate eight range from (0...7) every range in it determines the actual bit position in specific component of canopy image. If that bit is analogous to the bit in watermark, (0) are hold on within the Least Significant Bit (LSB) of the watermarked image; otherwise (1) are hold on. The other is that it will add multiple secret keys victimization shift and rotate operations. The watermark is embedded redundantly over all extracted blocks in image to extend image protection. This embedding is completed with

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 27 2023
Journal Name
3l The Southeast Asian Journal Of English Language Studies
Patterns of Diphthong Adaptation within English Loanwords in Iraqi Arabic
...Show More Authors

This study investigates the phonological adaptation of diphthongs within English loanwords in Iraqi Arabic (IA). In contrast to earlier small-scale descriptive studies, this study used quantitative content analysis to analyse 346 established loanwords collected through document review and direct observation to determine the diphthong adaptation patterns involved in the nativisation of English loanwords by native speakers of IA. Content analysis results revealed that most GB diphthong adaptations in English loanwords in IA occur in systematic patterns and thus may be ascribed to particular aspects in both L1 and L2 phonological systems. More specifically, the results indicate that the IA output forms tend to maintain the features of the GB i

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Modern Applied Science
New Combined Technique for Fingerprint Image Enhancement
...Show More Authors

This paper presents a combination of enhancement techniques for fingerprint images affected by different type of noise. These techniques were applied to improve image quality and come up with an acceptable image contrast. The proposed method included five different enhancement techniques: Normalization, Histogram Equalization, Binarization, Skeletonization and Fusion. The Normalization process standardized the pixel intensity which facilitated the processing of subsequent image enhancement stages. Subsequently, the Histogram Equalization technique increased the contrast of the images. Furthermore, the Binarization and Skeletonization techniques were implemented to differentiate between the ridge and valley structures and to obtain one

... Show More