To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of both languages.
Paronomasia is a recognized rhetorical device by which poets could play with words that are similar or identical in form but different in meaning. The present study aims to identify paronomasia in Arabic and English. To achieve the aim of the study, a corpus of selected verses chosen from two famous figures in Arabic and English literatures and analyzed thoroughly. The analysis of data under investigation reveals that paronomasia is a crucial aid used by poets to portrait the real world as imaginative. It further shows that the concept of paronomasia in English is not the same as in Arabic. In English, there are echoes of the Arabic jinās, i.e., there are counterpart usages of similar devices, yet English rhetoricians have not defined or c
... Show MoreAssimilation is defined ,by many phoneticians like Schane ,Roach ,and many others, as a phonological process when there is a change of one sound into another because of neighboring sounds.This study investigates the phoneme assimilation as a phonological process in English and Arabic and it is concerned specifically with the differences and similarities in both languages. Actually ,this study reflects the different terms which are used in Arabic to refer to this phenomenon and in this way it shows whether the term 'assimilation ' can have the same meaning of 'idgham' in Arabic or not . Besides, in Arabic , this phenomenon is discussed from&nb
... Show MoreThe paper is concerned with a linguistic analysis of the blurbs, used in advertising English and Arabic novels. A blurb is an advertising persuasive text, written on the back cover of a book. Blurbs of selected novels are chosen as representative examples. The selected blurbs belong to two languages, Arabic and English. The paper aims at studying the linguistic features that are characteristic of blurbs as advertising texts and making a sort of comparison between English blurbs and Arabic ones. A linguistic analysis on four levels is presented. Blurbs are tackled from the point of view of four linguistic disciplines that are phonology, syntax, semantics and discourse analysis. A reference is made to the linguistic featu
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreThe convergence speed is the most important feature of Back-Propagation (BP) algorithm. A lot of improvements were proposed to this algorithm since its presentation, in order to speed up the convergence phase. In this paper, a new modified BP algorithm called Speeding up Back-Propagation Learning (SUBPL) algorithm is proposed and compared to the standard BP. Different data sets were implemented and experimented to verify the improvement in SUBPL.
This research examines the phonological adaptation of pure vowels in English loanwords in Iraqi Arabic (IA). Unlike previous small-scale studies, the present study collected 346 loanwords through document review and self-observation, and then analyzed them using quantitative content analysis to identify the patterns of pure vowel adaptation involved in incorporating English loanwords into IA. The content analysis findings showed that most pure vowel adaptations in English loanwords in IA follow systematic patterns and may thus be attributed to specific characteristics of both L1 and L2 phonological systems. Specifically, the findings suggest that the IA output forms typically preserve the features of the input pure vowel to the maxi
... Show MoreAbstract: Culinary is a lexical item (Latin origin) which means kitchen. Culinary verbs have to do with cooking or kitchen. This paper tackles one of the Iraqi EFL learners’ difficulties of translating English culinary verbs into Arabic. It is considered significant for both translators and students of translation. It probes why Iraqi EFL learners are unable to find the appropriate Arabic equivalents of some English culinary verbs. Such English culinary verbs as broil, grate , simmer are mistranslated because they have no equivalents in Arabic and appear to be culture-specific terms that reflect the tradition of cooking. It is concluded that some English culinary verbs are difficult to translate which is due to the fact that Iraqi EFL
... Show MoreHomomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show More