To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of both languages.
ABSTRACT
Threw this research to the following:
1 - Know the impact of strategy Puglia in the collection of the rules of the Arabic language
students at the Institute of preparation parameters .
2 - Know the impact of the retention strategy in Puglia collection rules Arabic language
students at the Institute of preparation parameters .
To verify the status Mmermaa Find researcher Elsafreeten following two hypotheses :
1 - There is no statistically significant difference between the average score for the collection
of the fourth grade students at the Institute for the preparation of material parameters who
were studying grammar strategy Puglia and average grades collectible fourth grade
students at the Institu
THE PROBLEM OF TRANSLATING METAPHOR IN AN ARTISTIC TEXT (ON THE MATERIAL OF RUSSIAN AND ARABIC LANGUAGES)
There is currently a pressing need to create an electro-analytical approach capable of detecting and monitoring genosensors in a highly sensitive, specific, and selective way. In this work, Functionalized Multiwall Carbon Nanotubes, Graphene, Polypyrrole, and gold nanoparticles nanocomposite (f-MWCNTs-GR-PPy-AuNP) were effectively deposited on the surface of the ITO electrode using a drop-casting process to modify it. The structural, morphological, and optical analysis of the modified ITO electrodes was carried out at room temperature using X-ray diffraction (XRD), field emission scanning electron microscopy (FE-SEM) images, atomic force microscopy (AFM) and Fourier transform infrared (FTIR) spectra. Cyclic voltammetry (CV) and electrochemi
... Show MoreThe efforts embedded in this paper have been devoted to designing, preparing, and testing warm mix asphalt (WMA) mixtures and comparing their behavior against traditional hot mix asphalt mixtures. For WMA preparation, the Sasobit wax additive has been added to a 40/50 asphalt binder with a concentration of 3%. An experimental evaluation has been performed by conducting the Marshall together with volumetric properties, indirect tensile strength, and wheel tracking tests to acquire the tensile strength ratio (TSR), retained stability index (RSI), and rut depth. It was found that the gained benefit of reduction in mixing and compaction temperatures was reversely associated with a noticeable decline in Marshall properties and moisture s
... Show MoreGlobal warming has a serious impact on the survival of organisms. Very few studies have considered the effect of global warming as a mathematical model. The effect of global warming on the carrying capacity of prey and predators has not been studied before. In this article, an ecological model describing the relationship between prey and predator and the effect of global warming on the carrying capacity of prey was studied. Moreover, the wind speed was considered an influencing factor in the predation process after developing the function that describes it. From a biological perspective, the nonnegativity and uniform bounded of all solutions for the model are proven. The existence of equilibria for the model and its local stability is inves
... Show MoreEnergy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs). A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorit
... Show MoreMost recognition system of human facial emotions are assessed solely on accuracy, even if other performance criteria are also thought to be important in the evaluation process such as sensitivity, precision, F-measure, and G-mean. Moreover, the most common problem that must be resolved in face emotion recognition systems is the feature extraction methods, which is comparable to traditional manual feature extraction methods. This traditional method is not able to extract features efficiently. In other words, there are redundant amount of features which are considered not significant, which affect the classification performance. In this work, a new system to recognize human facial emotions from images is proposed. The HOG (Histograms of Or
... Show More