Preferred Language
Articles
/
oBb-e4kBVTCNdQwCDIqA
Arabic and English Texts Encryption Using Proposed Method Based on Coordinates System
...Show More Authors

Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Dec 30 2022
Journal Name
Journal Of The College Of Education For Women
Constructing Imminent Carcinogenic Attack in English and Arabic Scientific Discourse: A Corpus-Based Contrastive Study
...Show More Authors

Cancer is one of the critical health concerns. Health authorities around the world have devoted great attention to cancer and cancer causing factors to achieve control against the increasing rate of cancer. Carcinogens are the most salient factors that are accused of causing a considerable rate of cancer cases. Scientists, in different fields of knowledge, keep warning people of the imminent attack of carcinogens which are surrounding people in the environment and may launch their attack at any moment. The present paper aims to investigate the linguistic construction of the imminent carcinogen attack in English and Arabic scientific discourse. Such an investigation contributes to enhancing the scientists’ awareness of the linguistic co

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 30 2019
Journal Name
لارك
Approaches to Lexicography in English and Arabic
...Show More Authors

Lexicography, the art and craft of dictionary-making, is as old as writing. Since its very early stages several thousands of years ago, it has helped to serve basically the every-day needs of written communication among individuals in communities speaking different languages or different varieties of the same language. Two general approaches are distinguished in the craft of dictionary-making: the semasiological and the onomasiological. The former is represented by usually-alphabetical dictionaries as such, i.e. their being inventories of the lexicon, while the latter is manifested in thesauruses. English and Arabic have made use of both approaches in the preparation of their dictionaries, each having a distinct aim ahead. Wit

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2005
Journal Name
Journal Of The College Of Languages (jcl)
Difficulties Faced by Engineering Students in Reading and Comprehending English Texts
...Show More Authors

Reading is an interactive process that goes on between the reader and the text, resulting in comprehension. The text presents letters, words, sentences, and paragraphs that encode meaning. The reader uses knowledge, skills, and strategies to determine what that meaning is. Reading comprehension is much more than decoding; it results when the reader knows which skills and strategies are appropriate for the type oftext, and understands how to apply them to accomplish the reading purpose.Reading comprehension is important because without it reading is nothing more than tracking symbols on a page with your eyes and sounding them out leaving the reader with no information. Instead of promoting traditional approaches, reading should be taught

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2012
Journal Name
Journal Of The College Of Languages (jcl)
Difficulties Faced by Engineering Students in Reading and Comprehending English Texts
...Show More Authors

Reading is an interactive process that goes on between the reader and the text, resulting in comprehension. The text presents letters, words, sentences, and paragraphs that encode meaning. The reader uses knowledge, skills, and strategies to determine what that meaning is. Reading comprehension is much more than decoding; it results when the reader knows which skills and strategies are appropriate for the type oftext, and understands how to apply them to accomplish the reading purpose.Reading comprehension is important because without it reading is nothing more than tracking symbols on a page with your eyes and sounding them out leaving the reader with no information. Instead of promoting traditional approaches, reading should be ta

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 07 2022
Journal Name
Cogent Engineering
A partial image encryption scheme based on DWT and texture segmentation
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (21)
Crossref (10)
Scopus Crossref
Publication Date
Sun Apr 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Speech Analyses Method Using the Multiwavelet Transform
...Show More Authors

  Speech is the first invented way of communication that human used age before the invention of writing. In this paper, proposed method for speech analyses to extract features by using multiwavelet Transform (Repeated Row Preprocessing).The proposed system depends on the Euclidian differences of the coefficients of the multiwavelet Transform to determine the beast features of speech recognition. Each sample value in the reference file is computed by taking the average value of four samples for the same data (four speakers for the same phoneme). The result of the input data to every frame value in the reference file using the Euclidian distance to determine the frame with the minimum distance is said to be the "Best Match". Simulatio

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 01 2015
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Partial Encryption for Colored Images Based on Face Detection
...Show More Authors

Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref