Preferred Language
Articles
/
jih-1444
Combining a Hill Encryption Algorithm and LSB Technique With Dispersed Way for Securing Arabic and English Text Messages Hidden in Cover Image
...Show More Authors

         In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate      ( 75-86) that differentiates according to  length of message and image resolution

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
Schema Theory and Text- worlds: A Cognitive Stylistic Analysis of Selected Literary Texts
...Show More Authors

Cognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections.        Schema and text world theories are useful tools in cognitive stylistic studies. The reader's perception o

... Show More
Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Apr 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Secured Mechanism Towards Integrity of Digital Images Using DWT, DCT, LSB and Watermarking Integrations
...Show More Authors

"Watermarking" is one method in which digital information is buried in a carrier signal;
the hidden information should be related to the carrier signal. There are many different types of
digital watermarking, including traditional watermarking that uses visible media (such as snaps,
images, or video), and a signal may be carrying many watermarks. Any signal that can tolerate
noise, such as audio, video, or picture data, can have a digital watermark implanted in it. A digital
watermark must be able to withstand changes that can be made to the carrier signal in order to
protect copyright information in media files. The goal of digital watermarking is to ensure the
integrity of data, whereas stegano

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Nov 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Some Genetic Parameters and Path Coefficient of Three-Way Crosses in Maize
...Show More Authors
Abstract<p>Correlation and path coefficient analysis were worked out for ten morphological traits in 30 three-way crosses of maize. Phenotypic and genotypic correlation analysis indicated that ear length; row numbers per ear, grain numbers per row, leaf area and leaves numbers had a positive significant correlation with grain yield per plant. Further partitioning of correlation coefficients into direct and indirect effects showed that traits days to silking, row numbers per row and leaves numbers had a positive direct effect on grain yield per plant. The traits ear length, grain numbers per row and leaf area had a maximum total effect on grain yield. Furthermore, PCA analysis has gave interested</p> ... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Dec 15 2021
Journal Name
Nasaq
A Corpus-Based Approach to the Study of Vocabulary in English Textbooks for Iraqi Intermediate Schools
...Show More Authors

Learning the vocabulary of a language has great impact on acquiring that language. Many scholars in the field of language learning emphasize the importance of vocabulary as part of the learner's communicative competence, considering it the heart of language. One of the best methods of learning vocabulary is to focus on those words of high frequency. The present article is a corpus based approach to the study of vocabulary whereby the research data are analyzed quantitatively using the software program "AntWordprofiler". This program analyses new input research data in terms of already stored reliable corpora. The aim of this article is to find out whether the vocabularies used in the English textbook for Intermediate Schools in Iraq are con

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2011
Journal Name
Software Engineering And Computer Systems
Practical Adoptions of T-Way Strategies for Interaction Testing
...Show More Authors

View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of The College Of Languages (jcl)
Linguistic contast between bilateral and trilateral roots in Semitics languages (Arabic and Syriac as a model)
...Show More Authors

The present study investigates the relation between the biliteral and triliteral roots which is the introduction to comprehend the nature of the Semitic roots during its early stage of development being unconfirmed to a single pattern. The present research is not meant to decide on the question of the biliteral roots in the Semitic languages, rather it is meant to confirm the predominance of the triliteral roots on these languages which refers, partially, to analogy adopted by the majority of linguists. This tendency is frequently seen in the languages which incline to over generalize the triliteral phenomenon, i. e., to transfer the biliteral roots to the triliteral room, that is, to subject it to the predominant pattern regarding the r

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from

... Show More
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 15 2022
Journal Name
Arab World English Journal
Investigating Teachers of English Knowledge and Awareness of Dyslexia: A case study in Primary Iraqi Schools
...Show More Authors

Dyslexia is a learning disability in which people face difficulty reading though they are intelligent and have motivation for reading. Therefore; it impacts the portion of the brain responsible for processing language. Such a condition compromises the learning efficiency of the affected person, which generally gets unnoticed. Even affected children are unaware of their state. The study investigates the knowledge and awareness of dyslexia among teachers of English in Iraqi primary schools. this study has three objectives: (i) To investigate the amount of awareness and knowledge among the primary school teachers of English in Baghdad City about dyslexia.; (ii) To examine how English teachers’ awareness of dyslexia is affected by the

... Show More
View Publication
Clarivate Crossref
Publication Date
Tue Dec 15 2020
Journal Name
Al-academy
Dramatic Construction in Quranic Text Surah Taha – A model: جبار خماط حسن
...Show More Authors

There are many varied studies that dealt with the dramatic construction, especially books and studies that addressed drama in its construction and the method of writing it, that no textbook or a general cultural content is void of tackling the dramatic text in its construction and how the dramatic action develops in it. Therefore, a question occurs to the mind about the feasibility of dealing with the dramatic construction in this time, where many contemporary studies of dramatology and its relation and the contemporary critical directions are accumulating. This question many have two realistic aspects, yet the novelty and originality that this research shows lie in addressing a refined linguistic text in its style and connotations, such

... Show More
View Publication Preview PDF
Crossref (1)
Crossref