To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of both languages.
The reality of teaching the Arabic language rules is not satisfactory, as the pedagogical methods used do not help students develop their mental skills, especially critical thinking skills. They are often traditional in terms of teaching students, who are passive, passive, often passive, active, and often active, their listening task, and the teacher's task of narrating facts and judgments. It is a blind simulation student, a dependency on others, and a weak spirit of creativity, innovation, and opinion. The opinions of educators and teachers almost agree on the reasons for students' weakness in learning the rules of Arabic, and that the reason lies in the way of teaching. The difficulty or the ease of the rules of Arabic does not lie in th
... Show MoreEnglish allows for consonant sequences at the beginning of words, which poses a challenge for speakers of other languages, especially those whose native languages do not contain such sequences, such as Arabic. Therefore, this study aims to investigate students’ recognition and production of initial consecutive consonants in relation to gender, and the significance of the statistical differences between students in recognition and pronunciation of consecutive consonants. Consequently, a cohort of fifty-two Iraqi college students (18 males and 34 females) were selected as a sample. A multiple-choice test of two phases was used as a research instrument. The results showed that females outperformed males in recognizing and producing c
... Show MoreIn this research, the size strain plot method was used to estimate the particle size and lattice strain of CaTiO3 nanoparticles. The SSP method was developed to calculate new variables, namely stress, and strain energy, and the results were crystallite size (44.7181794 nm) lattice strain (0.001211), This method has been modified to calculate new variables such as stress and its value (184.3046308X10-3Mpa) and strain energy and its value (1.115833287X10-6 KJm-3).
Future wireless networks will require advance physical-layer techniques to meet the requirements of Internet of Everything (IoE) applications and massive communication systems. To this end, a massive MIMO (m-MIMO) system is to date considered one of the key technologies for future wireless networks. This is due to the capability of m-MIMO to bring a significant improvement in the spectral efficiency and energy efficiency. However, designing an efficient downlink (DL) training sequence for fast channel state information (CSI) estimation, i.e., with limited coherence time, in a frequency division duplex (FDD) m-MIMO system when users exhibit different correlation patterns, i.e., span distinct channel covariance matrices, is to date ve
... Show MoreEvolutionary algorithms are better than heuristic algorithms at finding protein complexes in protein-protein interaction networks (PPINs). Many of these algorithms depend on their standard frameworks, which are based on topology. Further, many of these algorithms have been exclusively examined on networks with only reliable interaction data. The main objective of this paper is to extend the design of the canonical and topological-based evolutionary algorithms suggested in the literature to cope with noisy PPINs. The design of the evolutionary algorithm is extended based on the functional domain of the proteins rather than on the topological domain of the PPIN. The gene ontology annotation in each molecular function, biological proce
... Show MoreThroughout this paper, a generic iteration algorithm for a finite family of total asymptotically quasi-nonexpansive maps in uniformly convex Banach space is suggested. As well as weak / strong convergence theorems of this algorithm to a common fixed point are established. Finally, illustrative numerical example by using Matlab is presented.
Confocal microscope imaging has become popular in biotechnology labs. Confocal imaging technology utilizes fluorescence optics, where laser light is focused onto a specific spot at a defined depth in the sample. A considerable number of images are produced regularly during the process of research. These images require methods of unbiased quantification to have meaningful analyses. Increasing efforts to tie reimbursement to outcomes will likely increase the need for objective data in analyzing confocal microscope images in the coming years. Utilizing visual quantification methods to quantify confocal images with naked human eyes is an essential but often underreported outcome measure due to the time required for manual counting and e
... Show More