Preferred Language
Articles
/
eBjX_pYBVTCNdQwCJZTi
Arabic and English Texts Encryption Using Modified Playfair Algorithm
...Show More Authors

To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of both languages.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 02 2023
Journal Name
Alustath Journal For Human And Social Sciences
THE SEMANTIC ANALYSIS OF PHRASAL VERBS IN AMERICAN AND BRITISH TEXTS
...Show More Authors

Publication Date
Fri Sep 15 2023
Journal Name
Al-academy
Perceiver And the imaginer in the texts of Yusuf Al _ sayegh
...Show More Authors

This research deals with the perceived and the imagined in the texts of Yusef Al-Sayegh, considering language as the most important source in literature and theatrical criticism, and given the importance of the subject, the researcher monitored many philosophical and psychological opinions and theories related to (the perceived and the imagined), and they were discussed and their compatibility with the Iraqi theatrical t As for the second chapter, where (the theoretical framework), it included two topics, and the first topic was about the concept of the perceived and the imagined, and the second topic was about Youssef Al-Sayegh and the structure of the theatrical text.
In the third chapter, where (research procedures), the research

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Developing Arabic License Plate Recognition System Using Artificial Neural Network and Canny Edge Detection
...Show More Authors

In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny edge detection

... Show More
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Developing Arabic License Plate Recognition System Using Artificial Neural Network and Canny Edge Detection
...Show More Authors

            In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Jun 26 2021
Journal Name
Journal Of Engineering
Adsorption Desulfurization of Iraqi Light Naphtha Using Metals Modified Activated Carbon
...Show More Authors

The study aims to evaluate the removal of sulfur content from Iraqi light naphtha produced in Al-Dora refinery by adsorption desulfurization DS technique using modified activated carbon MAC loaded with nickel Ni and copper Cu as single binary metals. The experiments were carried in a batch unit with various operating parameters;  MAC dosage, agitation speed, and a contact time of 300 min at constant initial sulfur concentration 155 ppm and temperature. The results showed higher DS% by AC/Ni-Cu (66.45)% at 500 rpm and 1 g dosage than DS (29.03)% by activated carbon AC, increasing MAC dosage, agitation speed, and contact time led to increasing DS% values.  The adsorption capacity of MAC results was recorded (16, 15, and 20) mg sulfu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
Automatic human ear detection approach using modified adaptive search window technique
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Proceedings Of The Aintec 2014 On Asian Internet Engineering Conference - Aintec '14
LTE Peak Data Rate Estimation Using Modified alpha-Shannon Capacity Formula
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Sat Jun 26 2021
Journal Name
Journal Of Engineering
Adsorption Desulfurization of Iraqi Light Naphtha Using Metals Modified Activated Carbon
...Show More Authors

The study aims to evaluate the removal of sulfur content from Iraqi light naphtha produced in Al-Dora refinery by adsorption desulfurization DS technique using modified activated carbon MAC loaded with nickel Ni and copper Cu as single binary metals. The experiments were carried in a batch unit with various operating parameters;  MAC dosage, agitation speed, and a contact time of 300 min at constant initial sulfur concentration 155 ppm and temperature. The results showed higher DS% by AC/Ni-Cu (66.45)% at 500 rpm and 1 g dosage than DS (29.03)% by activated carbon AC, increasing MAC dosage, agitation speed, and contact time led to increasing DS% values.  The adsorption capacity of MAC results was recorded (16,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Nominal Ellipsis in English & Arabic and its Influence on the Translation of the Meanings of Some Selected Qurànic Verses ( A Contrastive study ): هدى فالح حسن & جمانة شكيب محمد
...Show More Authors

Nominal ellipsis is a linguistic phenomenon found in English and Arabic .It is
based on leaving out a part of a nominal construction or more for the sake of good
style , compactness and connectedness .This phenomenon is found in the language of
the Glorious Qur’an .The study in hand is concerned with how translators handle
translating Qur’anic verses which contain ellipted nouns , i ,e. , to what extent the
translated Qur’anic verses are close to the original ones , and to what extent their
translations serve understanding the meanings of the glorious verses while at the
same time maintaining their beauty in style. The study aims at shedding light on
nominal ellipsis in English and Arabic .The study undertak

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 05 2025
Journal Name
Mesopotamian Journal Of Computer Science
DGEN: A Dynamic Generative Encryption Network for Adaptive and Secure Image Processing
...Show More Authors

Cyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix

... Show More
View Publication
Scopus Crossref