Preferred Language
Articles
/
jih-470
Texts Ciphering by using Translation Principle
...Show More Authors

The proposed algorithm that is presented in this paper is based on using the principle of texts translation from one language to another, but I will develop this meaning to cipher texts by using any electronic dictionary as a tool of ciphering based on the locations of the words that text contained them in the dictionary. Then convert the text file into picture file, such as BMP-24 format. The picture file will be transmitted to the receiver. The same algorithm will be used in encryption and decryption processing in forward direction in the sender, and in backward direction in the receiver. Visual Basic 6.0 is used to implement the proposed cryptography algorithm.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 02 2020
Journal Name
Journal Of The College Of Languages (jcl)
The Kurdish experiment in the process of translation (1898-1991): ئةزمووني كوردي لة ثرؤسةي وةرطيَرِاندا (189 – 1991
...Show More Authors

Translation as a human endeavor has occupied the attention of nations since it bridges the gab between cultures and helps in bringing out national integration. The translation of Kurdish literature started with personal efforts in which newspapers and magazines had played a vital role in supporting translation and paved the way for promoting the publication of Kurdish products.

      The bulk of the materials translated from Arabic exceeds that translated from other languages owing to the influence of religious and authoritarian factors.

The survey of the Kurdish journals was limited to the period 1898-1991 since it marked a radical and historic change represented by the birth of Kurdish journalis

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
Improving the Properties of Gypsum By Using Additives
...Show More Authors

Gypsum Plaster is an important building materials, and because of the availabilty of its raw materials. In this research the effect of various additives on the properties of plaster was studied , like Polyvinyl Acetate, Furfural, Fumed Silica at different rate of addition and two types of fibers, Carbon Fiber and Polypropylene Fiber to the plaster at a different volumetric rate. It was found that after analysis of the results the use of Furfural as an additive to plaster by 2.5% is the optimum ratio of addition to that it improved the flexural Strength by 3.18%.
When using Polyvinyl Acetate it was found that the ratio of the additive 2% is the optimum ratio of addition to the plaster, because it improved the value of the flexural stre

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Lithotripsy of Urinary Tract Stones by Using Eggshell
...Show More Authors

 This research aimed to  use eggshell powder as a lithtripsian for different types of urinary stones and determine the efficiency of these preparations against different types of stone.      The grounded and sterilized eggshell was dissolved in fresh lemon juice .The treatment was orally given   for successive 7 days before breakfast.       Eighty five patients with different types of  urinary stone  were participated in this research. All patients were subjected to Ultrasonography and intravenous pyelography examinations to localize the position and detect diameter of the stone. The above examination and also biochemical tests for diagnosis of stones in

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
Reducing Lost Circulation Problem by Using Rice Material
...Show More Authors

Drilling fluid loss during drilling operation is undesirable, expensive and potentially hazardous problem.

    Nasiriyah oil field is one of the Iraqi oil field that suffer from lost circulation problem. It is known that Dammam, um-Radoma, Tayarat, Shiranish and Hartha are the detecting layers of loss circulation problem. Different type of loss circulation materials (LCMs) ranging from granular, flakes and fibrous were used previously to treat this problem.  

    This study presents the application of rice as a lost circulation material that used to mitigate and stop the loss problem when partial or total losses occurred.

     The experim

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 04 2018
Journal Name
Baghdad Science Journal
Solving Fuzzy Games Problems by Using Ranking Functions
...Show More Authors

In this paper, we deal with games of fuzzy payoffs problem while there is uncertainty in data. We use the trapezoidal membership function to transform the data into fuzzy numbers and utilize the three different ranking function algorithms. Then we compare between these three ranking algorithms by using trapezoidal fuzzy numbers for the decision maker to get the best gains

View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Dec 06 2009
Journal Name
Baghdad Science Journal
Decoding Reed- Muller Codes by Using Hadamard Matrices
...Show More Authors

This paper discusses the problem of decoding codeword in Reed- Muller Codes. We will use the Hadamard matrices as a method to decode codeword in Reed- Muller codes.In addition Reed- Muller Codes are defined and encoding matrices are discussed. Finally, a method of decoding is explained and an example is given to clarify this method, as well as, this method is compared with the classical method which is called Hamming distance.

View Publication Preview PDF
Crossref
Publication Date
Sat Sep 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Attack Stream Cipher By Using Cipher System Only
...Show More Authors

Attack  stream  cipher  system  , using cipher  text only  , depends on the  characteristics of  plain  teKt language  and  the randomness of  the key , that used  in encryption , without  having detailed  k.nuwh:dgt:: uf cipher algorithm by benefiting  from the balance between O's and  I' in the key to reduce the probability of key space.

 

View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Key Exchange Management by using Neural Network Synchronization
...Show More Authors

The paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Advances In Intelligent Systems And Computing
Forecasting by Using the Optimal Time Series Method
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref