The proposed algorithm that is presented in this paper is based on using the principle of texts translation from one language to another, but I will develop this meaning to cipher texts by using any electronic dictionary as a tool of ciphering based on the locations of the words that text contained them in the dictionary. Then convert the text file into picture file, such as BMP-24 format. The picture file will be transmitted to the receiver. The same algorithm will be used in encryption and decryption processing in forward direction in the sender, and in backward direction in the receiver. Visual Basic 6.0 is used to implement the proposed cryptography algorithm.
The scientific studies that deal with Herminutia (interpretation) as the art of reading the interpretation practiced by the recipient after his understanding of the literary texts and works of art that he sees or read them so that these readings to make the act of reading and allow him the opportunity to mature and rational reflection of each text or artistic work.
Based on this, the researchers considered the establishment of the problem of their research through the search for the problematic overlap of concepts in the interpretive practices of the literary text?
The second chapter dealt with the definition of the term interpretation as well as interpretation as a theory and concept, and then the indicators reached by t
... Show MoreAmong Persian poets and literary works, Ferdowsi and Shahnameh have a distinctive and prominent place. Since the 5th C. AH , they took the interest of all Persian language and literature scholars and were one of the first books to be translated into different languages including Arabic by Al Fatih Bin Ali Bin Mohammed Al-Bandari in the year of (620)AH .Because it was completed in the early 7th C. AH and in terms of antiquity, there is no older copy than of Al-Bandari’s version which holds great value in the analysis of Shahnameh other different copies.
To find out the how far analogy goes, the present paper makes a general comparisons of Bijan and Manijeh in Shahnameh Fer
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreBN Rashid, AJES, 2014
Political terminology differs from any other type of terminology not only in the presence of political terminology, but also in content, structure, functions and the recipient who perceives it. Taking this into account, it is inappropriate to consider the semantic difficulties of translating Russian-language political terms solely at the semantic level. In our opinion, it is inextricably linked with the lexical, syntactic and grammatical levels. If we combine all 4 levels, then the following translation techniques can be distinguished: lexical borrowing (transcription / transliteration, tracing); modulation; generalization / concretization; omission / addition; descriptive translation; conversion [Komissarov 2013]. One of the most
... Show Moreترجمۀ شعر به آهنگ موسیقی از شاهکارهای فکری که تولیدی علمی ترجمی می آراید به شمار میرود ، چیزی مورد نا راحتی ونومیدی نسبت به مترجم وجود ندارد ، اگر وی در این راه با تلاش کردنی سیر می رود تا ثمره های آن ترجمه می چیند .
روش پژوهشگر در آنچه از ترجمۀ ابیات شعر فارسی بر آمد ، روشی نوینی می داند که آن بر هماهنگی آواز الفاظ با یکدیگر اتکای می کند تا ترجمه دارای آوازی وهماهنگی ، به مرتبه ای موسیق
... Show MoreWith the spread of global markets for modern technical education and the diversity of programs for the requirements of the local and global market for information and communication technology, the universities began to race among themselves to earn their academic reputation. In addition, they want to enhance their technological development by developing IMT systems with integrated technology as the security and fastest response with the speed of providing the required service and sure information and linking it The network and using social networking programs with wireless networks which in turn is a driver of the emerging economies of technical education. All of these facilities opened the way to expand the number of students and s
... Show MoreIn this paper, the series solution is applied to solve third order fuzzy differential equations with a fuzzy initial value. The proposed method applies Taylor expansion in solving the system and the approximate solution of the problem which is calculated in the form of a rapid convergent series; some definitions and theorems are reviewed as a basis in solving fuzzy differential equations. An example is applied to illustrate the proposed technical accuracy. Also, a comparison between the obtained results is made, in addition to the application of the crisp solution, when theï€ ï¡-level equals one.
Equation Boizil used to Oatae approximate value of bladder pressure for 25 healthy people compared with Amqas the Alrotinahh ways used an indirect the catheter Bashaddam and found this method is cheap and harmless and easy