To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of both languages.
Suggestive ambiguity is a strategy of defense and maneuvering as it provides the speaker both protection and function. To put it differently, it helps the speaker to say whatever he likes and at the same time gives his opponents and friends the interpretation they desire. This is possible due to the flexibility of the linguistic expressions that the speaker uses. To be more clear, the context of situation, peoples' background and world knowledge interact with the significance of the linguistic expressions reaching an allusive situation where two interpretations, positive and negative, are available to the addressees. Such situation enables the addressers to implicate different ideas or messages, accusations, inciting violence, etc. The pres
... Show Moreabstract:
Objectives: The study aims to reveal the approach of Imam Al-Salmi in the weighting between the apparently conflicting texts, and to show the extent of his agreement and disagreement with the rest of the fundamentalists, and does he have vocabulary that can be used to elicit legal rulings in modern contemporary issues?
Method: The method of induction and analysis is one of the main tools to reach the research results. The study resorted to following the sayings of Imam Al-Salmi in various sources and fatwas and standing on them, then analyzing and applying them to the various branches of jurisprudence in the various jurisprudential chapters.
... Show MoreThe cuneiform texts considered one of the most important resources which play an important role help us to know how was the economic , politic and religious manner and every thing have relation of the history of Mesopotamia which contain many of information that enrich our knowldgement every side of Mesopotamia civilization since using writing as away to register the science and human knowldgement . The city of Sippar (Abu –Habba ) was one of most important city of ancient Mesopotamia which mentioned as one of first five Mesopotamian cities found before floating and it exposed through excavating rich one of them tablet which some of it dated to old Babylon period . The king Ammi-Saduqa has a big share of tablet we study number of thi
... Show MoreEncryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show MoreThis paper presents a hybrid genetic algorithm (hGA) for optimizing the maximum likelihood function ln(L(phi(1),theta(1)))of the mixed model ARMA(1,1). The presented hybrid genetic algorithm (hGA) couples two processes: the canonical genetic algorithm (cGA) composed of three main steps: selection, local recombination and mutation, with the local search algorithm represent by steepest descent algorithm (sDA) which is defined by three basic parameters: frequency, probability, and number of local search iterations. The experimental design is based on simulating the cGA, hGA, and sDA algorithms with different values of model parameters, and sample size(n). The study contains comparison among these algorithms depending on MSE value. One can conc
... Show MoreWireless sensor networks (WSNs) represent one of the key technologies in internet of things (IoTs) networks. Since WSNs have finite energy sources, there is ongoing research work to develop new strategies for minimizing power consumption or enhancing traditional techniques. In this paper, a novel Gaussian mixture models (GMMs) algorithm is proposed for mobile wireless sensor networks (MWSNs) for energy saving. Performance evaluation of the clustering process with the GMM algorithm shows a remarkable energy saving in the network of up to 92%. In addition, a comparison with another clustering strategy that uses the K-means algorithm has been made, and the developed method has outperformed K-means with superior performance, saving ener
... Show MoreIn this paper we proposed the method of X-ray fluorescence (XRF) determination of some essential trace elements in medicinal herbs and vitamin-mineral complexes at the level of 100-101 mg/ml. To increase sensitivity and selectivity of the determination we simple and effective approach based on the extraction of metal ions from aqueous solutions with chemically modified polyurethane foam sorbents followed by direct XRF analysis. The conditions of sorption preconcentration of Co(II), Ni(II) and Zn(II) ions with modified sorbents were optimized. The proposed approach is used for the determination of trace elements in several kinds of medicinal herbs (coltsfoot leaves, nettle leaves and yarrow herb) and vitamin-mineral
... Show MoreProverbs gain their importance not only from the fact that they represent a cultural record of the people of every nation, but they reveal the way they use language and how they exploit their environments as a good source of inspiration to enrich that language. Domestic animals, as part of every environment, play a major role in composing proverbs in every nation.
This study is an attempt to pragmastylistically analyse some selected English and Iraqi rural proverbs using domestic animals in their texts. It limits itself to investigate certain stylistic and pragmatic devices such as: the type of sentences, their lengths, their content and grammatical words, the part of speech used, metaph
... Show MoreWith the advancement of technology ,the study of cross-cultural communication via on line has become an important and researchable topic in linguistic theory and its applications.The aims of this study are two- fold (a) exploring the influence of cultural diversity on on-line interaction between American native speakers (NSs) and Iraqi non-native speakers (NNSs) of English which, together with other factors might potentially lead to what Thomas(1983) calls "pragmatic failure" (PF), a main cause of communication breakdowns and (b) specifying which type of PF occurs more frequently between the two groups along with the reasons behind such failures. To achie
... Show MoreThe present study aims to investigate the various request constructions used in Classical Arabic and Modern Arabic language by identifying the differences in their usage in these two different genres. Also, the study attempts to trace the cases of felicitous and infelicitous requests in the Arabic language. Methodologically, the current study employs a web-based corpus tool (Sketch Engine) to analyze different corpora: the first one is Classical Arabic, represented by King Saud University Corpus of Classical Arabic, while the second is The Arabic Web Corpus “arTenTen” representing Modern Arabic. To do so, the study relies on felicity conditions to qualitatively interpret the quantitative data, i.e., following a mixed mode method
... Show More