To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of both languages.
Language is essential for politics, for producing, disseminating, engaging with, and reacting to political discourse. The pragmatics of political speeches is crucial to the development of effective political communication tactics. Thus, speech is situated at the intersection of rhetoric, linguistics, and politics. In communication, intent is a pragmatic factor that plays a crucial role at the time of the communication process. Speech is of paramount importance to the social and political domains. Through the use of concepts and the relationship between language and politics, the study analyzes the function of language in communication and interpretation of intentions. The study of the relationships between language and the situations in whi
... Show MoreAfter the fall of the Third Dynasty of Ur at the hands of the Elamites during the reign of its last ruler, King Ibi-Sin, the Amorites continued to flow more into Mesopotamia in the form of large migrations that established a number of contemporary and conflicting ruling dynasties that formed the Old Babylonian era. Among these dynasties was the Larsa dynasty, founded by King Nablanum in the city of Larsa. The fourth king who ruled in the Larsa dynasty, Gungunum, was one of the most powerful kings who stood up to the Isin dynasty, which had until that time enjoyed great political superiority in the country. The kings who ruled after him expanded their influence and controlled a number of cities, especially the cities of Nippur and Uruk, whic
... Show MoreThe present study has three objectives: 1) to investigate the prevalence of complex nominals in economic discourse represented via the selected business news texts, 2) to shed some light on the most common translation errors made by second year students in the Department of Translation in rendering complex nominals into Arabic, and 3) to detect the possible causes behind such translation errors and suggest some translation tips which might sound helpful to the students of translation to find the most suitable translation equivalent. The present study is based on an empirical survey in which a selective analysis of someeconomic texts represented in business news texts is made. A corpus of 159 complex nominals was selected from seven busin
... Show MoreThis article publishes seven cuneiform tablets in the collection of the Iraq Museum Baghdad. Six of the tablets have an Irisagrig/Al Sarraki provenance, the seventh is of uncertain origin. They are dated to the reigns of Amar-Suen (AS) and Ibbi-Suen (IS) of the Ur III Dynasty. The texts represent administrative texts of the governing institutions and account for economic activities including the assignment of female workers for wool plucking, the remuneration of canal work with barley and the selection of wool for textiles. Three tablets record offerings in respect of cultic observances, two of which describe the disbursement of foodstuffs for the king's monthly 83-63 offerings to the new moon.
Cuneiform texts are the most important sources for our knowledge of ancient history and in all political, economic, social and religious fields, as the ancients left us thousands of these texts, which were found through excavations, and hundreds of these texts were stolen and smuggled out of Iraq, and some of these texts were returned after the Jordanian government confiscated them and returned them to the Iraqi Museum. Most of these cuneiform texts were economic texts. In this research, a group of these confiscated cuneiform texts was studied (their number was six texts bearing the following museum numbers, respectively (160609 - 160103 - 160290 - 160102 - 206650 - 206637) dating back to the time of the king of the Larsa dynasty, Rim-Sin (
... Show MorePublication and edition of two tablets from the library in the Ebabbar Temple of Sippar, a manuscript of the ‘Babylonian Poem of the Righteous Sufferer’ (
My research to study the processes of the creation of shapes and encrypt any encryption in design forms and contents of computer technology as the creative property of definable and renewal, change and transformation process of transformative theme of shape, form and content encryption process in textile designs lets us know the meaning or substance which may be invisible to the encryption in the digital design of fabrics is a recruitment ideas modern and refined through a technique to accomplish the work of a beautiful audiences with novelty and innovation. The search includes four chapters:1Chapter I deal with the problem of research and its current research (form and content encryption with digital designs in women's contemporary fabr
... Show MoreShifting Sand of English in Iraq language Policy and Planning
In this paper , some of lexical stylistic , syntactical stylistic devices , and one phonetic stylistic device are going to be illustrated in the study of the aphorisms of “life and death” . These stylistic devices are parallelism , hyperbole , alliteration , meiosis , irony , oxymoron , cliché , litotes , metalepsis , and loose sentences. This paper aims at identifying the functions and the frequencies of these devices. These stylistic devices make one speech and writing more interesting and help to get the attention of readers/ listeners
Cryptographic applications demand much more of a pseudo-random-sequence
generator than do most other applications. Cryptographic randomness does not mean just
statistical randomness, although that is part of it. For a sequence to be cryptographically
secure pseudo-random, it must be unpredictable.
The random sequences should satisfy the basic randomness postulates; one of them is
the run postulate (sequences of the same bit). These sequences should have about the same
number of ones and zeros, about half the runs should be of length one, one quarter of length
two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones
should be the same. These properties can be measured determinis