Abstract: This article is a comparative analysis of the concept and types of homonyms in Russian and Arabic. Homonyms are lexical units that have the same sound but different meanings. The study of homonymy in different languages can help reveal the features of the semantic structure and syntactic rules of each language. The article discusses the main aspects of homonymy in Russian and Arabic, as well as a comparative analysis of the types of homonyms that exist in both languages. The study includes an analysis of the semantic meanings of homonyms, their use in context, and possible differences in syntactic features that may affect their interpretation and perception by native speakers of these languages. The purpose of the article is to identify similarities and differences between homonyms in Russian and Arabic, as well as understanding the influence of linguistic features on the emergence and functioning of homonymous phenomena in both languages. The results of the study may be useful for linguistic researchers, teachers and students interested in the semantic and syntactic aspects of various language systems.
Rivest Cipher 4 (RC4) is an efficient stream cipher that is commonly used in internet protocols. However, there are several flaws in the key scheduling algorithm (KSA) of RC4. The contribution of this paper is to overcome some of these weaknesses by proposing a new version of KSA coined as modified KSA . In the initial state of the array is suggested to contain random values instead of the identity permutation. Moreover, the permutation of the array is modified to depend on the key value itself. The proposed performance is assessed in terms of cipher secrecy, randomness test and time under a set of experiments with variable key size and different plaintext size. The results show that the RC4 with improves the randomness and secrecy with
... Show MoreIt is known that images differ from texts in many aspects, such as high repetition and correlation, local structure, capacitance characteristics and frequency. As a result, traditional encryption methods can not be applied to images. In this paper we present a method for designing a simple and efficient messy system using a difference in the output sequence. To meet the requirements of image encryption, we create a new coding system for linear and nonlinear structures based on the generation of a new key based on chaotic maps.
The design uses a kind of chaotic maps including the Chebyshev 1D map, depending on the parameters, for a good random appearance. The output is a test in several measurements, including the complexity of th
... Show MoreThe ï¤- Multiple mixing ratios of ï§-transitions from levels of 56Fe populated in 56 56 ( , ) Fe n n Fe ï§ ï‚¢ reactions are calculated by using const. S.T.M. This method has been used in other works [3,7] but with pure transition or with transitions that can be considered as pure transitionsØŒ in our work we used This method for mixed ï§ - transitions in addition to pure ï§ - transitions. The experimental angular distribution coefficients a2 was used from previous works [1] in order to calculet ï¤- values. It is clear from the results that the ï¤- values are in good agreement or consistent, within associated errors, with those reported previously [1]. The discrepancies that occur
... Show More<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show MoreThis paper presents a computer simulation model of a thermally activated roof (TAR) to cool a room using cool water from a wet cooling tower. Modeling was achieved using a simplified 1-D resistance-capacitance thermal network (RC model) for an infinite slab. Heat transfer from the cooling pipe network was treated as 2-D heat flow. Only a limited number of nodes were required to obtain reliable results. The use of 6th order RC-thermal model produced a set of ordinary differential equations that were solved using MATLAB - R2012a. The computer program was written to cover all possible initial conditions, material properties, TAR system geometry and hourly solar radiation. The cool water supply was considered time
... Show MoreThe ability of beans (Phaseolus vulgaris L.) to uptake three pharmaceuticals (diclofenac, mefenamic acid and metronidazole) from two types of soil (clay and sandy soil) was investigated in this study to explore the human exposure to these pharmaceuticals via the consumption of beans. A pot experiment was conducted with beans plants which were grown in two types of soil for six weeks under controlled conditions. During the experiment period, the soil pore water was collected weekly and the concentrations of the test compounds in soil pore water as well as in plant organs (roots, stems and leaves) were weekly determined.
The results showed that the studied pharmaceuticals were detected in all plant tissues; their concentration
Methicillin resistant Staphylococcus aureus (MRSA) is one of the principal nosocomial causative agents. This bacterium has the capability to resist wide range of antibiotics and it is responsible for many diseases like skin, nose and wounds infection. In this study, randomly amplified polymorphic DNA (RAPD)-PCR was applied with ten random primers to examine the molecular diversity among methicillin resistant Staphylococcus aureus (MRSA) isolates in the hospitals and to investigate the genetic distance between them. 90 Isolates were collected from clinical specimens from Iraqi hospitals for a total of 90 isolates. Only 10 strains (11.11%) were found to be MRSA. From these 10 primers, only 9 gave clear amplification products. 91 fragment l
... Show MoreNH3 gas sensor was fabricated based on deposited of Functionalized Multi-Walled Carbon Nanotubes (MWCNTs-OH) suspension on filter paper substrates using suspension filtration method. The structural, morphological and optical properties of the MWCNTs film were characterized by XRD, AFM and FTIR techniques. XRD measurement confirmed that the structure of MWCNTs is not affected by the preparation method. The AFM images reflected highly ordered network in the form of a mat. The functional groups and types of bonding have appeared in the FTIR spectra. The fingerprint (C-C stretch) of MWCNTs appears in 1365 cm-1, and the backbone of CNTs observed at 1645 cm-1. A homemade sensi
... Show MoreВ современной литературе особое внимание уделяется не только сюжету и композиции произведения, но и глубине проработки персонажей. Один из ярких представителей такого подхода – писатель Тимур Пулатов. В его произведениях каждый персонаж обладает своей уникальной семантикой имени, которая играет важную роль в раскрытии характеров и отношений между героями.
Аннотация: настоящая статья посвящена обоснованию важности задачи формирования медиаграмотности у вторичной языковой личности на современном этапе развития общества. В тексте работы трактуются основные теоретические понятия, связанные с заявленной проблемой, такие как «языковая личность», «вторичная языковая личность», медиаграмотность», «коммуникативная компетенция», «медиатекст». Также определяе
... Show More