Preferred Language
Articles
/
oBb-e4kBVTCNdQwCDIqA
Arabic and English Texts Encryption Using Proposed Method Based on Coordinates System
...Show More Authors

Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Modified Blowfish Algorithm for Image Encryption using Multi Keys based on five Sboxes
...Show More Authors

In this paper, a new modification was proposed to enhance the security level in the Blowfish algorithm by increasing the difficulty of cracking the original message which will lead to be safe against unauthorized attack. This algorithm is a symmetric variable-length key, 64-bit block cipher and it is implemented using gray scale images of different sizes. Instead of using a single key in cipher operation, another key (KEY2) of one byte length was used in the proposed algorithm which has taken place in the Feistel function in the first round both in encryption and decryption processes. In addition, the proposed modified Blowfish algorithm uses five Sboxes instead of four; the additional key (KEY2) is selected randomly from additional Sbox

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 18 2020
Journal Name
Rimak International Journal Of Humanities And Social Sciences
STRESS IN ENGLISH AND ARABIC: A CONTRASTIVE STUDY
...Show More Authors

DBN Rashid, Rimak International Journal of Humanities and Social Sciences, 2020

View Publication
Publication Date
Thu Jun 01 2006
Journal Name
Journal Of The College Of Languages (jcl)
Demonstratives in English and Arabic : A Contrastive Study
...Show More Authors

This paper studies the demonstratives as deictic expressions in Standard Arabic and English by outlining their phonological, syntactic and semantic properties in the two languages. On the basis of the outcome of this outline, a contrastive study of the linguistic properties of this group of deictic expressions in the two languages is conducted next. The aim is to find out what generalizations could be made from the results of this contrastive study.

View Publication Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Tue Jan 18 2022
Journal Name
Iraqi Journal Of Science
Image Encryption Based on Intelligent Session Mask Keys
...Show More Authors

The revolution of multimedia has been a driving force behind fast and secured data transmission techniques. The security of image information from unapproved access is imperative. Encryptions technique is used to transfer data, where each kind of data has its own special elements; thus various methods should to be used to conserve distributing the image. This paper produces image encryption improvements based on proposed an approach to generate efficient intelligent session (mask keys) based on investigates from the combination between robust feature for ECC algebra and construction level in Greedy Randomized Adaptive Search Procedure (GRASP) to produce durable symmetric session mask keys consist of ECC points. Symmetric behavior for ECC

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Mon Feb 04 2019
Journal Name
Iraqi Journal Of Physics
Satellite image classification using proposed singular value decomposition method
...Show More Authors

In this work, satellite images for Razaza Lake and the surrounding area
district in Karbala province are classified for years 1990,1999 and
2014 using two software programming (MATLAB 7.12 and ERDAS
imagine 2014). Proposed unsupervised and supervised method of
classification using MATLAB software have been used; these are
mean value and Singular Value Decomposition respectively. While
unsupervised (K-Means) and supervised (Maximum likelihood
Classifier) method are utilized using ERDAS imagine, in order to get
most accurate results and then compare these results of each method
and calculate the changes that taken place in years 1999 and 2014;
comparing with 1990. The results from classification indicated that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Header-Words Based for Printed Arabic Document Images Retrieval System
...Show More Authors

Printed Arabic document image retrieval is a very important and needed system for many companies, governments and various users. In this paper, a printed Arabic document images retrieval system based on spotting the header words of official Arabic documents is proposed. The proposed system uses an efficient segmentation, preprocessing methods and an accurate proposed feature extraction method in order to prepare the document for classification process. Besides that, Support Vector Machine (SVM) is used for classification. The experiments show the system achieved best results of accuracy that is 96.8% by using polynomial kernel of SVM classifier.

View Publication Preview PDF
Publication Date
Tue Jun 20 2023
Journal Name
مجلة كلية التربية للبنات – الجامعة العراقية ،ت
Use of collocant food items in Arabic and English
...Show More Authors

This paper investigates the collocational use of irreversible food binomials in the lexicons of English (UK) and Arabic (Iraq), their word-order motivations, cultural background, and how they compare. Data consisted in sixteen pairs in English, versus fifteen in Arabic. Data analysis has shown their word order is largely motivated by logical sequencing of precedence; the semantically bigger or better item comes first and the phonologically longer word goes last. These apply in a cline of decreasing functionality: logical form first, semantic importance second, phonological form last. In competition, the member higher in this cline wins first membership. While the entries in each list clearly reflect culturally preferred food meals in the UK

... Show More