Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used to encode messages (characters, numbers, and special characters) to binary numbers. Three encoding ideas are proposed for this reason. At the same time, the second step is used Arabic language words to represent the obtained binary sequences to achieve the final secret text. The obtained results exhibited that sending a text containing secret messages in a different language (Arabic) cannot be suspicious when read.
The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreThe study aims to examine the reality of preparing the Arabic language teacher for non-native speakers by presenting the experience of the Arabic Language Institute at the International University of Africa. Thus, it addresses the following questions: How is it possible to invest the long scientific experiences in proposal and experiment preperations to qualify Arabic language teachers for non-native speakers? What is the reality of preparing an Arabic language teacher at the Institute? How did the Arabic Language Institute process teacher preparation? What are the problems facing the preparation of the Arabic language teachers and the most important training mechanisms used in that Institute?What problems faced the implementation of the
... Show MoreAn investigation of the quadrupole deformation of Kr, Sr, Zr, and Mo isotopes has been conducted using the HFB method and SLy4 Skyrme parameterization. The primary role of occupancy of single particle state 2d5/2 in the existence of the weakly bound structure around N=50 is probed. Shell gaps are performed using a few other calculations for the doubly magic number 100Sn using different Skyrme parameterizations. We explore the interplays among neutron pairing strength and neutron density profile in two dimensions, along with the deformations of 100Sn.
This paper is concerned with introducing and studying the new approximation operators based on a finite family of d. g. 'swhich are the core concept in this paper. In addition, we study generalization of some Pawlak's concepts and we offer generalize the definition of accuracy measure of approximations by using a finite family of d. g. 's.
The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
The standard formulation of Wave Intensity Analysis (WIA) assumes that the flow velocity (U) in the conduit is <;<; the velocity of propagation of waves (c) in the system, and Mach number, M=U/c, is negligible. However, in the large conduit arteries, U is relatively high due to ventricular contraction and c is relatively low due to the large compliance; thus M is > 0, and may not be ignored. Therefore, the aim of this study is to identify experimentally the relationship between M and the reflection coefficient in vitro. Combinations of flexible tubes, of 2 m in length with isotropic and uniform circular cross sectional area along their longitudinal axes, were used to present mother and daughter tubes to produce a range of reflection coeffic
... Show MoreThis study focuses on the impact of technology on creating a dystopian world as presented by the English playwright Caryl Churchill in her play A Number (2002). This dramatic work came as a reaction to the most crucial and valuable turning point in the scientific achievements of human engineering, namely, the cloning of the sheep called Dolly. Therefore, A Number is a play that presents an analytical stage for imagining the biotechnological and scientific future. This dramatic vignette captures the playwright’s fears towards the abnormal progress of technology and science and how far such technological progress affects human relationships and identity. It also portrays how technological progress results in the feeling of a lack of
... Show MoreThe primary components of successful engineering projects are time, cost, and quality. The use of the ring footing ensures the presence of these elements. This investigation aims to find the optimum number of geogrid reinforcement layers under ring footing subjected to inclined loading. For this purpose, experimental models were used. The parameters were studied to find the optimum geogrid layers number, including the optimum geogrid layers spacing and the optimum geogrid layers number. The optimum geogrid layers spacing value is 0.5B. And as the load inclination angle increased, the tilting and the tilting improvement percent for the load inclination angles (5°,10°,15°) are (40%,28%, and 5%) respectively. The reduction percent o
... Show MoreThe primary components of successful engineering projects are time, cost, and quality. The use of the ring footing ensures the presence of these elements. This investigation aims to find the optimum number of geogrid reinforcement layers under ring footing subjected to inclined loading. For this purpose, experimental models were used. The parameters were studied to find the optimum geogrid layers number, including the optimum geogrid layers spacing and the optimum geogrid layers number. The optimum geogrid layers spacing value is 0.5B. And as the load inclination angle increased, the tilting and the tilting improvement percent for the load inclination angles (5°,10°,15°) are (40%,28%, and 5%) respectively. The reduction percent of the
... Show MoreTranslation is both a social and cultural phenomenon, it can neither exist outside a social community and it is within society, nor it can be viewed as a medium of cross-cultural fertilization. This paper aims to investigate the difficulties that a translator may face when dealing with legal texts such as marriage and divorce contracts. These difficulties can be classified according to the present paper into syntactic, semantic, and cultural. The syntactic difficulties include word order, syntactic arrangement, unusual sentence structure, the use of model verbs in English, and difference in legal system. As to the semantic difficulties, they involve lack of established terminology, finding functional and lexical equivalence, word for word t
... Show More