Preferred Language
Articles
/
oRc7FY4BVTCNdQwCADF3
Fast approach for arabic text encryption using genetic algorithm
...Show More Authors

As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with respect to the conventional encryption techniques like RSA, DES, etc.

Publication Date
Mon Oct 07 2024
Journal Name
Научный форум:
FEATURES OF TRANSLATION OF POLYSEMANTIC VERBS FROM RUSSIAN INTO ARABIC
...Show More Authors

Publication Date
Fri Jul 01 2011
Journal Name
Engineering And Technology Journal
Off-Line Arabic Signature Recognition Based on Invariant Moments Properties
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Tue Jun 27 2023
Journal Name
3l The Southeast Asian Journal Of English Language Studies
Patterns of Diphthong Adaptation within English Loanwords in Iraqi Arabic
...Show More Authors

This study investigates the phonological adaptation of diphthongs within English loanwords in Iraqi Arabic (IA). In contrast to earlier small-scale descriptive studies, this study used quantitative content analysis to analyse 346 established loanwords collected through document review and direct observation to determine the diphthong adaptation patterns involved in the nativisation of English loanwords by native speakers of IA. Content analysis results revealed that most GB diphthong adaptations in English loanwords in IA occur in systematic patterns and thus may be ascribed to particular aspects in both L1 and L2 phonological systems. More specifically, the results indicate that the IA output forms tend to maintain the features of the GB i

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Mon Feb 21 2022
Journal Name
Научный форум: Филология, искусствоведение и культурология: сб. ст. по материалам Lv междунар. науч.-практ. конф. – No 1 (55). – М.
Metaphor and difficulties of its translation from Russian into Arabic
...Show More Authors

This article discusses a discussion of trends and patterns of understanding and application of the concept of metaphor to various subjects that may interfere with the perspective of metaphors in translation theory, an attempt was made to use the principles and characteristics of metaphors and their fundamental tradition in translation theory, and to uncover the perspective of considering metaphor as a conceptual process. presenting its merits, since it is still considered an eccentric expression of linguistics.

Preview PDF
Publication Date
Thu Apr 30 2020
Journal Name
The Asian Esp Journal
A Linguistic Study of ''and'' (و) in Arabic and English.
...Show More Authors

The conjunctive ''and'' and its Arabic counterpart ''و'' are discourse markers that express certain meanings and presuppose the presence of other elements in discourse. They are indispensable aids to both the text writers and readers. The present study aims to show that such cohesive ties help the writer to organize his main argument and communicate his ideas vividly and smoothly. They also serve as explicit signals that help readers unfold text and follow its threads as realized in the progression of context. The researcher has utilized the Quirk Model of Semantic Implication for data analysis. A total of 42 (22 for English and 20 for Arabic) political texts selected from different elite newspapers in both Arabic and English for the analy

... Show More
Publication Date
Sat Jan 11 2020
Journal Name
Dirasat, Human And Social Sciences
The translation of sexual puns in Shakespeare’s Hamlet into Arabic
...Show More Authors

Scopus
Publication Date
Wed Sep 18 2019
Journal Name
Journal Of The College Of Education For Women
The Linguistic Term and the Problems of the Arabic Reception
...Show More Authors

     

        The linguistic researcher reads a systematic crisis, idiomatic problems within the linguistic term coming to the Arab culture. Where most of them return back to problems of receiving these sciences which are represented by phenomena like the multiplicity linguistic term, disturbance translated idiomatic concept and its duality.

Aims of the research :

1-Initializing new textbooks to form linguistic project and Arabic linguistic theory.

2-Determination adjusted knowledge, concepts of Arabian heritage linguistics subject

3-Observation  the causes of disturbance crisis of linguistic term and its relation to

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 25 2019
Journal Name
Engineering And Technology Journal
Improvement of Harris Algorithm Based on Gaussian Scale Space
...Show More Authors

Features is the description of the image contents which could be corner, blob or edge. Corners are one of the most important feature to describe image, therefore there are many algorithms to detect corners such as Harris, FAST, SUSAN, etc. Harris is a method for corner detection and it is an efficient and accurate feature detection method. Harris corner detection is rotation invariant but it isn’t scale invariant. This paper presents an efficient harris corner detector invariant to scale, this improvement done by using gaussian function with different scales. The experimental results illustrate that it is very useful to use Gaussian linear equation to deal with harris weakness.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Wed May 06 2015
Journal Name
16th Conference In Natural Science And Mathematics
Efficient digital Image filtering method based on fuzzy algorithm
...Show More Authors

Recently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse

... Show More
View Publication