To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of both languages.
The artistic signature of calligraphers has been regarded as a significant aspect of Arabic calligraphy since its inception. As the art form evolved and acquired an aesthetic dimension, the artistic signature became an integral part of this dimension. The calligrapher failed to include his name on the frames, a practice that has become customary among calligraphers nowadays. This tradition allowed to trace the evolution of Arabic calligraphy and identify certain gaps in the calligraphy composition. Additionally, the inclusion of calligrapher's name contributes to the achievement of visual balance within the calligraphy composition, signifying consistency or formal separation. The current study concentrated to investigate the aesthet
... Show MoreContrary to deconstruction and its destructive pursuit, the concept of undermining the familiar seeks to refute the constants and its known limitations. It is done through the process of receiving and what is imposed by the formation of the word or text or the structural and design structure in general, along with the Arabic calligraphy in particular. This is based on the recipient's understanding and interpretation of the dual phenomenon and the content's manifestation. More accurately, the disclosure of its reality through its expressive phenomenology; for that sake, the research was devoted to studying “undermining the familiar and embodiment content in Arabic calligraphy” including four chapters. The first chapter comprised
... Show MoreIdea of research
The global vision for the future of mankind and societies to achieve supremacy, empowerment and victory is limited to the sincerity of the sincere Islamic vision and its evidence, and this true vision is presented through the texts of the Noble Qur’an, the Sunnah of the Prophet and the concrete reality to achieve victory and empowerment of Islam, and does not respond by tracking the movement of history and its interventions.
The Islamic nation is a nation of survival and continuity with God’s promise and it needs to wake up and alert, and leadership that takes its hand into the path of victory and empowerment, and that this promise fulfills conditions of the most important of these is a promis
... Show MoreThe study aims to demonstrate the importance of instructional methods in teaching Arabic language as a second language or teaching the Arabic language to non-native speakers. The study is in line with the tremendous development in the field of knowledge, especially in the field of technology and communication, and the emergence of many electronic media in education in general and language teaching in particular. It employs an image in teaching vocabulary and presenting the experience of the Arabic Language Institute for Non-Speakers-King Abdul-Aziz University. The study follows the descriptive approach to solve the problem represented by the lack of interest in the educational methods when teaching Arabic as a second language. Accordingl
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show More
In 2020 one of the researchers in this paper, in his first research, tried to find out the Modified Weighted Pareto Distribution of Type I by using the Azzalini method for weighted distributions, which contain three parameters, two of them for scale while the third for shape.This research compared the distribution with two other distributions from the same family; the Standard Pareto Distribution of Type I and the Generalized Pareto Distribution by using the Maximum likelihood estimator which was derived by the researchers for Modified Weighted Pareto Distribution of Type I, then the Mont Carlo method was used–that is one of the simulation manners for generating random samples data in different sizes ( n= 10,30,50), and in di
... Show MorePoly(L-lactic acid) (PLLA)/poly(caprolactone) (PCL) and two types of organoclay (OMMT) including a fatty amide and ocatdecylamine montmorillonite (FA-MMT and ODA-MMT) were employed to produce polymer nanocomposites by melt blending. Materials were characterized using X-ray diffraction (XRD), Fourier transform infrared (FTIR) spectroscopy, thermogravimetric analysis (TGA), elemental analysis, scanning electron microscopy (SEM) and transmission electron microscopy (TEM). Mechanical properties were also investigated for these nanocomposites. The nanocomposites showed increasing mechanical properties and thermal stability. XRD results indicated that the materials formed nanocomposites. SEM morphology showed that increasing content of OMMT reduc
... Show MoreQJ Rashid, IH Abdul-Abbas, MR Younus, PalArch's Journal of Archaeology of Egypt/Egyptology, 2021 - Cited by 4
DBN Rashid, IMPAT: International Journal of Research in Humanities, Arts, and Literature, 2016 - Cited by 5