In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harnesses the unique attributes of this language, encompassing its complex character designs, diacritical marks, and ligatures, to effectively protect information. In this work, we propose a new text steganography method based on Arabic language characteristics concealment, where the proposed method has two levels of security which are: Arabic encoding and word shifting. In the first step, build a new Arabic encoding mapping table to convert an English plaintext to Arabic characters, then use a word shifting process to add an authentication phase for the sending message and add another level of security to the achieved ciphertext. The proposed method showed that Arabic language characteristics steganography achieved 0.15 ms for 1 k, 1.0033 ms for 3 k, 2.331 ms for 5 k, and 5.22 ms for 10 k file sizes respectively.
We study the physics of flow due to the interaction between a viscous dipole and boundaries that permit slip. This includes partial and free slip, and interactions near corners. The problem is investigated by using a two relaxation time lattice Boltzmann equation with moment-based boundary conditions. Navier-slip conditions, which involve gradients of the velocity, are formulated and applied locally. The implementation of free-slip conditions with the moment-based approach is discussed. Collision angles of 0°, 30°, and 45° are investigated. Stable simulations are shown for Reynolds numbers between 625 and 10 000 and various slip lengths. Vorticity generation on the wall is shown to be affected by slip length, angle of incidence,
... Show Moreفي هذا البحث نحاول تسليط الضوء على إحدى طرائق تقدير المعلمات الهيكلية لنماذج المعادلات الآنية الخطية والتي تزودنا بتقديرات متسقة تختلف أحيانا عن تلك التي نحصل عليها من أساليب الطرائق التقليدية الأخرى وفق الصيغة العامة لمقدرات K-CLASS. وهذه الطريقة تعرف بطريقة الإمكان الأعظم محدودة المعلومات "LIML" أو طريقة نسبة التباين الصغرى"LVR
... Show MoreObjective: The goal of this research is to load Doxorubicin (DOX) on silver nanoparticles coupled with folic acid and test their anticancer properties against breast cancer. Methods: Chitosan-Capped silver nanoparticles (CS-AgNPs) were manufactured and loaded with folic acid as well as an anticancer drug, Doxorubicin, to form CS-AgNPs-DOX-FA conjugate. AFM, FTIR, and SEM techniques were used to characterize the samples. The produced multifunctional nano-formulation served as an intrinsic drug delivery system, allowing for effective loading and targeting of chemotherapeutics on the Breast cancer (AMJ 13) cell line. Flowcytometry was used to assess therapy efficacy by measuring apoptotic induction. Results: DOX and CS-Ag
... Show MoreThe surface finish of the machining part is the mostly important characteristics of products quality and its indispensable customers’ requirement. Taguchi robust parameters designs for optimizing for surface finish in turning of 7025 AL-Alloy using carbide cutting tool has been utilized in this paper. Three machining variables namely; the machining speeds (1600, 1900, and 2200) rpm, depth of cut (0.25, 0.50, 0.75) mm and the feed rates (0.12, 0.18, 0.24) mm/min utilized in the experiments. The other variables were considered as constants. The mean surface finish was utilized as a measuring of surface quality. The results clarified that increasing the speeds reduce the surface roughness, while it rises with increasing the depths and fee
... Show MoreSocieties developed throughout history with the development of life technology, that ideas presented by the contemporary art have been crystallized. The development included all the artistic fields such as the dramatic arts which depend on many effects and elements that led to the completion of the structure of the theater show. Scenography is considered one of the most important elements that the theatre show depends on such as the decoration, lighting, sound effects, costumes and accessories. The research addressed the following question: what are the characteristics and traits of scenography in the theatre show?
The research importance has become clear because it sheds lights on the characteristics of scenography in the Iraqi thea
The study of the language through the prophetic curriculum in general and the semantics in particular through the books of Professor Abdul Salam Yassin, may God have mercy on him and the most distinctive linguistic phenomena, and then study semantics and the most prominent methods that reveal the emotions dominated by this study to indicate the semantics of religious terms In this research we try to dive into the sea of significance to know the relationship between the words and their connotations, and to monitor aspects of semantic development, although we have left non-essential words in order to avoid lengthening. N or three and sometimes Aguetsarna on one example we thought it was enough to clarify the meaning.
Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreIn this study, an efficient compression system is introduced, it is based on using wavelet transform and two types of 3Dimension (3D) surface representations (i.e., Cubic Bezier Interpolation (CBI)) and 1 st order polynomial approximation. Each one is applied on different scales of the image; CBI is applied on the wide area of the image in order to prune the image components that show large scale variation, while the 1 st order polynomial is applied on the small area of residue component (i.e., after subtracting the cubic Bezier from the image) in order to prune the local smoothing components and getting better compression gain. Then, the produced cubic Bezier surface is subtracted from the image signal to get the residue component. Then, t
... Show MoreIn this paper, a cognitive system based on a nonlinear neural controller and intelligent algorithm that will guide an autonomous mobile robot during continuous path-tracking and navigate over solid obstacles with avoidance was proposed. The goal of the proposed structure is to plan and track the reference path equation for the autonomous mobile robot in the mining environment to avoid the obstacles and reach to the target position by using intelligent optimization algorithms. Particle Swarm Optimization (PSO) and Artificial Bee Colony (ABC) Algorithms are used to finding the solutions of the mobile robot navigation problems in the mine by searching the optimal paths and finding the reference path equation of the optimal
... Show More