Preferred Language
Articles
/
PRdyXo8BVTCNdQwCVHTq
Text Steganography Based on Arabic Characters Linguistic Features and Word Shifting Method
...Show More Authors

In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harnesses the unique attributes of this language, encompassing its complex character designs, diacritical marks, and ligatures, to effectively protect information. In this work, we propose a new text steganography method based on Arabic language characteristics concealment, where the proposed method has two levels of security which are: Arabic encoding and word shifting. In the first step, build a new Arabic encoding mapping table to convert an English plaintext to Arabic characters, then use a word shifting process to add an authentication phase for the sending message and add another level of security to the achieved ciphertext. The proposed method showed that Arabic language characteristics steganography achieved 0.15 ms for 1 k, 1.0033 ms for 3 k, 2.331 ms for 5 k, and 5.22 ms for 10 k file sizes respectively.

Publication Date
Sat Feb 01 2020
Journal Name
Physics Of Fluids
Modeling the effects of slip on dipole–wall collision problems using a lattice Boltzmann equation method
...Show More Authors

We study the physics of flow due to the interaction between a viscous dipole and boundaries that permit slip. This includes partial and free slip, and interactions near corners. The problem is investigated by using a two relaxation time lattice Boltzmann equation with moment-based boundary conditions. Navier-slip conditions, which involve gradients of the velocity, are formulated and applied locally. The implementation of free-slip conditions with the moment-based approach is discussed. Collision angles of 0°, 30°, and 45° are investigated. Stable simulations are shown for Reynolds numbers between 625 and 10 000 and various slip lengths. Vorticity generation on the wall is shown to be affected by slip length, angle of incidence,

... Show More
View Publication
Scopus (14)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
8th Engineering And 2nd International Conference For College Of Engineering – University Of Baghdad: Coec8-2021 Proceedings
Impact of project delivery method on geotechnical site conditions for implementing water treatment plants in Iraq
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Application of “LIML_LVR” method practically according to the general formula K-CLASS on suggestion simultaneous equation
...Show More Authors

في هذا البحث نحاول تسليط الضوء على إحدى طرائق تقدير المعلمات الهيكلية لنماذج المعادلات الآنية الخطية والتي تزودنا بتقديرات متسقة تختلف أحيانا عن تلك التي نحصل عليها من أساليب الطرائق التقليدية الأخرى وفق الصيغة العامة لمقدرات K-CLASS. وهذه الطريقة تعرف بطريقة الإمكان الأعظم محدودة المعلومات "LIML" أو طريقة نسبة التباين الصغرى"LVR

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 26 2022
Journal Name
Journal Of Contemporary Medical Sciences
Doxorubicin Immobilization on chitosan-modified silver Nanoparticles as a drug delivery method for effective anticancer treatment
...Show More Authors

Objective: The goal of this research is to load Doxorubicin (DOX) on silver nanoparticles coupled with folic acid and test their anticancer properties against breast cancer. Methods: Chitosan-Capped silver nanoparticles (CS-AgNPs) were manufactured and loaded with folic acid as well as an anticancer drug, Doxorubicin, to form CS-AgNPs-DOX-FA conjugate. AFM, FTIR, and SEM techniques were used to characterize the samples. The produced multifunctional nano-formulation served as an intrinsic drug delivery system, allowing for effective loading and targeting of chemotherapeutics on the Breast cancer (AMJ 13) cell line. Flowcytometry was used to assess therapy efficacy by measuring apoptotic induction.  Results: DOX and CS-Ag

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Study the Effects of Machining Parameters on Surface Roughness for Free Form Surface Using Taguchi Method
...Show More Authors

The surface finish of the machining part is the mostly important characteristics of products quality and its indispensable customers’ requirement. Taguchi robust parameters designs for optimizing for surface finish in turning of 7025 AL-Alloy using carbide cutting tool has been utilized in this paper. Three machining variables namely; the machining speeds (1600, 1900, and 2200) rpm, depth of cut (0.25, 0.50, 0.75) mm and the feed rates (0.12, 0.18, 0.24) mm/min utilized in the experiments. The other variables were considered as constants. The mean surface finish was utilized as a measuring of surface quality. The results clarified that increasing the speeds reduce the surface roughness, while it rises with increasing the depths and fee

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 16 2018
Journal Name
Al-academy
Scenography Features in the Iraqi Contemporary Theatre Show (Macbeth Play, by Salah Al-Qasab- A Model)
...Show More Authors

Societies developed throughout history with the development of life technology, that ideas presented by the contemporary art have been crystallized. The development included all the artistic fields such as the dramatic arts which depend on many effects and elements that led to the completion of the structure of the theater show. Scenography is considered one of the most important elements that the theatre show depends on such as the decoration, lighting, sound effects, costumes and accessories. The research addressed the following question: what are the characteristics and traits of scenography in the theatre show?
The research importance has become clear because it sheds lights on the characteristics of scenography in the Iraqi thea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Features of the Quranic significance when Abdul Salam Yassin   at Light of the prophetic curriculum theory
...Show More Authors

The study of the language through the prophetic curriculum in general and the semantics in particular through the books of Professor Abdul Salam Yassin, may God have mercy on him and the most distinctive linguistic phenomena, and then study semantics and the most prominent methods that reveal the emotions dominated by this study to indicate the semantics of religious terms In this research we try to dive into the sea of ​​significance to know the relationship between the words and their connotations, and to monitor aspects of semantic development, although we have left non-essential words in order to avoid lengthening. N or three and sometimes Aguetsarna on one example we thought it was enough to clarify the meaning.

View Publication Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF
Publication Date
Sat Nov 05 2016
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
Image Compression Based on Cubic Bezier Interpolation, Wavelet Transform, Polynomial Approximation, Quadtree Coding and High Order Shift Encoding
...Show More Authors

In this study, an efficient compression system is introduced, it is based on using wavelet transform and two types of 3Dimension (3D) surface representations (i.e., Cubic Bezier Interpolation (CBI)) and 1 st order polynomial approximation. Each one is applied on different scales of the image; CBI is applied on the wide area of the image in order to prune the image components that show large scale variation, while the 1 st order polynomial is applied on the small area of residue component (i.e., after subtracting the cubic Bezier from the image) in order to prune the local smoothing components and getting better compression gain. Then, the produced cubic Bezier surface is subtracted from the image signal to get the residue component. Then, t

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Wed Jul 31 2019
Journal Name
Journal Of Engineering
A Comparative Study of Various Intelligent Optimization Algorithms Based on Path Planning and Neural Controller for Mobile Robot
...Show More Authors

In this paper, a cognitive system based on a nonlinear neural controller and intelligent algorithm that will guide an autonomous mobile robot during continuous path-tracking and navigate over solid obstacles with avoidance was proposed. The goal of the proposed structure is to plan and track the reference path equation for the autonomous mobile robot in the mining environment to avoid the obstacles and reach to the target position by using intelligent optimization algorithms. Particle Swarm Optimization (PSO) and Artificial Bee Colony (ABC) Algorithms are used to finding the solutions of the mobile robot navigation problems in the mine by searching the optimal paths and finding the reference path equation of the optimal

... Show More
View Publication Preview PDF
Crossref (3)
Crossref