WA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steganographic method hides embedded data at various locations in cover irregularly or randomly, whereas the locations of cover for information hiding are not constant, this property will increase the level of security for proposed method. In the proposed method, the sender needs sending a file that has small size via any communication channel and that considered as a key while sending a cover is not necessary to recipient if both agree about downloading it from the internet before sending a file. The contents of this file are invaluable for an attacker. The programming language that used in programming this proposed method is C++ language. Steganographically, The proposed steganographic method is strong and robust. It is possible classifying this proposed method as a public key steganography system and substitution system at the same time.
In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MoreThis study introduced the effect of using magnetic abrasive finishing method (MAF) for finishing flat surfaces. The results of experiment allow considering the MAF method as a perspective for finishing flat surfaces, forming optimum physical mechanical properties of surfaces layer, removing the defective layers and decreasing the height of micro irregularities. Study the characteristics which permit judgment parameters of surface quality after MAF method then comparative with grinding
Reliability is an essential measure and important component of all power system planning and operation procedures. It is one of the key design factors when designing complex, critical and expensive systems. This paper presents a fuzzy logic approach for reliability improvement planning purposes. Evaluating the reliability of the complex and large planned Iraqi super grid ;as Al- Khairat generating station with its tie set is intended to be compact to that grid; and determination of the given reliability improvement project are the major goals of the paper. Results show that the Iraqi super grid reliability is improved by 9.64%. In the proposed technique, fuzzy set theory is used to include imprecise indices of different components in normal
... Show MoreWeb testing is very important method for users and developers because it gives the ability to detect errors in applications and check their quality to perform services to users performance abilities, user interface, security and other different types of web testing that may occur in web application. This paper focuses on a major branch of the performance testing, which is called the load testing. Load testing depends on an important elements called request time and response time. From these elements, it can be decided if the performance time of a web application is good or not. In the experimental results, the load testing applied on the website (http://ihcoedu.uobaghdad.edu.iq) the main home page and all the science departments pages. In t
... Show MoreSteganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality
... Show MoreThe permeability determination in the reservoirs that are anisotropic and heterogeneous is a complicated problem due to the limited number of wells that contain core samples and well test data. This paper presents hydraulic flow units and flow zone indicator for predicting permeability of rock mass from core for Nahr-Umr reservoir/ Subba field. The Permeability measurement is better found in the laboratory work on the cored rock that taken from the formation. Nahr-Umr Formation is the main lower cretaceous sandstone reservoir in southern of Iraq. This formation is made up mainly of sandstone. Nahr-Umr formation was deposited on a gradually rising basin floor. The digenesis of Nahr-Umr sediments is very important du
... Show MoreAn efficient combination of Adomian Decomposition iterative technique coupled with Laplace transformation to solve non-linear Random Integro differential equation (NRIDE) is introduced in a novel way to get an accurate analytical solution. This technique is an elegant combination of theLaplace transform, and the Adomian polynomial. The suggested method will convert differential equations into iterative algebraic equations, thus reducing processing and analytical work. The technique solves the problem of calculating the Adomian polynomials. The method’s efficiency was investigated using some numerical instances, and the findings demonstrate that it is easier to use than many other numerical procedures. It has also been established that (LT
... Show More