To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of both languages.
This research aimed to identify the level of English language knowledge among the students of scientific colleges and the preparatory year (scholarship students) at the Islamic University of Madinah. The research was limited to identifying students at the meanings of vocabulary and grammar of the English language. The researcher used a descriptive approach to achieve study goals. It applied three tools to collect information from the targeted sample; first, a test for determining the level of students in the achievement of vocabulary which applied to (69) students. Second, a test to determine the level of students in the English language grammar, (73) students took part. Third, a survey to get students’ opinions about the program of te
... Show MoreWe aimed to examine the effect of amoxicillin and azithromycin suspensions on the microhardness of sliver-reinforced glass ionomer and nano-resin modified glass ionomer (GI). Method: Thirty discs (2mm height x 4mm diameter) of each type of GI were prepared, which were randomly assigned to amoxicillin, azithromycin, and artificial saliva groups. Microhardness was evaluated by Vickers hardness test before and after three immersion cycles. Results: The overall model (P < 0.001), before/after intervention (P < 0.001), intervention group (type of antibiotic) (P=0.013), and type of glass ionomer (P < 0.001) showed significant differences among study groups (P < 0.001). Post hoc test showed only non-significant before/after difference for Azithrom
... Show MoreOne of the recent significant but challenging research studies in computational biology and bioinformatics is to unveil protein complexes from protein-protein interaction networks (PPINs). However, the development of a reliable algorithm to detect more complexes with high quality is still ongoing in many studies. The main contribution of this paper is to improve the effectiveness of the well-known modularity density ( ) model when used as a single objective optimization function in the framework of the canonical evolutionary algorithm (EA). To this end, the design of the EA is modified with a gene ontology-based mutation operator, where the aim is to make a positive collaboration between the modularity density model and the proposed
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreThe ability of the human brain to communicate with its environment has become a reality through the use of a Brain-Computer Interface (BCI)-based mechanism. Electroencephalography (EEG) has gained popularity as a non-invasive way of brain connection. Traditionally, the devices were used in clinical settings to detect various brain diseases. However, as technology advances, companies such as Emotiv and NeuroSky are developing low-cost, easily portable EEG-based consumer-grade devices that can be used in various application domains such as gaming, education. This article discusses the parts in which the EEG has been applied and how it has proven beneficial for those with severe motor disorders, rehabilitation, and as a form of communi
... Show MoreThis research aims to shed light on some phonetic linguistic terms used in the Arabic phonetic lesson for the purpose of monitoring, analyzing and tracking its developments. Such a step helps to standardize and weigh between them. The study follows a descriptive-analytical approach; it surveys the problem of the phonetic linguistic term, and its linguistic exactness. Then, it examines some phonetic terms in the Arabic phonetic lesson, such as phonology and phonology; intensity, looseness and mediation; the production, articulatory, transition, position, and the two vocal chords. One of the most prominent conclusions of the study is that the phonetic linguistic terminology enjoyed a tangible development since its infancy, given that phone
... Show MoreThis research is intended to high light the uses of political content in foreign Arabic / speaking websites, such as “ CNN “ and” Euro News“, The research problem stems from the main question: What is the nature of the use of the websites in the political content provided through them? A set of sub-questions that give the research aspects and aims to achieve a set of objectives , including the identification of topics that included , the political content provided through , the sample sites during the time period for analysis and determine that the study uses descriptive research based on the discovery of the researcher, describing it accurately and defining the relations between the components.
The research conducted the des