This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.
The Turkish Kurdistan Workers Party (PKK) is one of the most influential elements in the Iraqi national security since 2014. It has a new and effective role in the Iraqi political arena, as a result of participating in combat operations against ISIS in Nineveh Governorate, which prompted several minorities within the province to sympathize with its presence and its role in particular in Sinjar after ISIS committed the most brutal crimes against the Aizidi minority, Turkey took advantage of the security conditions that Iraq went through after the entry of ISIS into the country to expand its influence in the north, using the pretext of the PKK and the previous agreement between the two countries on border protection. Also, the continued
... Show MoreThe aim of this study is to shed light on the importance of biofuels as an alternative to conventional energy, in addition to the importance of preserving agricultural crops, which are the main source of this fuel, to maintain food security, especially in developing countries. The increase in global oil prices, in addition to the fear of global warming, are among the main factors that draw the world’s attention to searching for alternative sources of traditional energy, which are sustainable on the one hand, and on the other hand reduce carbon emissions. Therefore, the volume of global investment in renewable energy in general, and in liquid biofuels and biomass in particular, has increased. Global fears emerged that the excessive convers
... Show MoreDiscriminant analysis is a technique used to distinguish and classification an individual to a group among a number of groups based on a linear combination of a set of relevant variables know discriminant function. In this research discriminant analysis used to analysis data from repeated measurements design. We will deal with the problem of discrimination and classification in the case of two groups by assuming the Compound Symmetry covariance structure under the assumption of normality for univariate repeated measures data.
... Show More
This abstract focuses on the significance of wireless body area networks (WBANs) as a cutting-edge and self-governing technology, which has garnered substantial attention from researchers. The central challenge faced by WBANs revolves around upholding quality of service (QoS) within rapidly evolving sectors like healthcare. The intricate task of managing diverse traffic types with limited resources further compounds this challenge. Particularly in medical WBANs, the prioritization of vital data is crucial to ensure prompt delivery of critical information. Given the stringent requirements of these systems, any data loss or delays are untenable, necessitating the implementation of intelligent algorithms. These algorithms play a pivota
... Show MoreHarold Pinter’s The Caretaker(1959) clearly portrays a lack of communication among the characters of the play which refers to the condition of modern man. This failure of communication led Harold Pinter to use a lot of pauses and silences in all the plays he wrote instead of words. Samuel Beckett preceded Pinter in doing so in his plays and one way to express the bewilderment of modern man during the 20th century is through the use of no language in the dramatic works. Language is no more important to modern man; instead, he uses silence to express his feelings. Silence is more powerful than the words themselves. That’s why long and short pauses can be seen throughout all Pinter’s plays.
In this play, th
... Show MoreThe research entitled "The Slogans of Demonstrators at Al-Tahreer Square – analytical study for communicative letters" studies the slogans of demonstrators as a communicative means having many signs reflecting the political, social, cultural relations exist in the minds of people. It is so easy to understand its meaning, examining its goals; and explaining their meanings. For these reasons, we have chosen such a topic. Since the means of communications transfer letters between a sender and receiver, the importance of this research is that it is a researchable trial to acknowledge the issues behind the demonstrators' slogans and the different styles have been chosen by them for a whole year; the different sides of the demonstration sinc
... Show MorePsychological research centers help indirectly contact professionals from the fields of human life, job environment, family life, and psychological infrastructure for psychiatric patients. This research aims to detect job apathy patterns from the behavior of employee groups in the University of Baghdad and the Iraqi Ministry of Higher Education and Scientific Research. This investigation presents an approach using data mining techniques to acquire new knowledge and differs from statistical studies in terms of supporting the researchers’ evolving needs. These techniques manipulate redundant or irrelevant attributes to discover interesting patterns. The principal issue identifies several important and affective questions taken from
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show More