Preferred Language
Articles
/
fRbmvYoBVTCNdQwCDaS4
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used to encode messages (characters, numbers, and special characters) to binary numbers. Three encoding ideas are proposed for this reason. At the same time, the second step is used Arabic language words to represent the obtained binary sequences to achieve the final secret text. The obtained results exhibited that sending a text containing secret messages in a different language (Arabic) cannot be suspicious when read.

Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
ON NAIVE TAYLOR MODEL INTEGRATION METHOD
...Show More Authors

Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
Hyper AT-ideal on AT-algebra
...Show More Authors
Abstract<p>In this paper is to introduce the concept of hyper AT-algebras is a generalization of AT-algebras and study a hyper structure AT-algebra and investigate some of its properties. “Also, hyper AT-subalgebras and hyper AT-ideal of hyper AT-algebras are studied. We study on the fuzzy theory of hyper AT-ideal of hyper AT-algebras hyper AT-algebra”. “We study homomorphism of hyper AT-algebras which are a common generalization of AT-algebras.</p>
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
on periodic point and chaotic functions
...Show More Authors

We dealt with the nature of the points under the influence of periodic function chaotic functions associated functions chaotic and sufficient conditions to be a very chaotic functions Palace

View Publication Preview PDF
Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of The College Of Education For Women
The Video effect on Youths Value
...Show More Authors

The Video effect on Youths Value

View Publication Preview PDF
Publication Date
Mon Oct 01 2012
Journal Name
2012 Ieee International Conference On Circuits And Systems (iccas)
A survey of on-chip monitors
...Show More Authors

Systems on Chips (SoCs) architecture complexity is result of integrating a large numbers of cores in a single chip. The approaches should address the systems particular challenges such as reliability, performance, and power constraints. Monitoring became a necessary part for testing, debugging and performance evaluations of SoCs at run time, as On-chip monitoring is employed to provide environmental information, such as temperature, voltage, and error data. Real-time system validation is done by exploiting the monitoring to determine the proper operation of a system within the designed parameters. The paper explains the common monitoring operations in SoCs, showing the functionality of thermal, voltage and soft error monitors. The different

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Mon Apr 11 2016
Journal Name
Annals Of Fuzzy Mathematics And Informatics
Some notions on convex soft sets
...Show More Authors

View Publication
Publication Date
Wed Mar 14 2007
Journal Name
Journal Of Education College Wasit University
On the deviation of literary language
...Show More Authors

DBN Rashid, Journal of Education College Wasit University 1(1):412-423, 2007

View Publication
Publication Date
Fri Dec 31 2010
Journal Name
Ibn Al- Haitham J. Fo R Pure & Appl. Sc I
Biochemical Study on Diabetic Nephropathy Patients
...Show More Authors

This study deals with thirty non-insulin dependent diabetes mellitus patients suffering from diabetic nephropathy in addition to twenty five healthy control.Some biochemical parameters were determined in the serum of all subjects enrolled in the study.These parameters are serum glucose,serum urea,serum creatinine,total serum protein and serum albumin.The aim of the present study was to estimate these parameters in diabetic nephropathy patients. The results of the present study revealed a significant increase in glucose,urea and creatinine in patients as compared to controls . Also a significant decrease was found in total serum protein, serum albumin and albumin to globulin ratio (A/G) in patients compared to controls,whi

... Show More
Publication Date
Thu Feb 01 2007
Journal Name
No
On Solvability of an Operator Equation-
...Show More Authors

Publication Date
Sat Jun 01 2019
Journal Name
2019 Ieee International Conference On Automatic Control And Intelligent Systems (i2cacis)
Study on Solar Panel Cleaning Robot
...Show More Authors

View Publication
Scopus (34)
Crossref (29)
Scopus Clarivate Crossref