In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harnesses the unique attributes of this language, encompassing its complex character designs, diacritical marks, and ligatures, to effectively protect information. In this work, we propose a new text steganography method based on Arabic language characteristics concealment, where the proposed method has two levels of security which are: Arabic encoding and word shifting. In the first step, build a new Arabic encoding mapping table to convert an English plaintext to Arabic characters, then use a word shifting process to add an authentication phase for the sending message and add another level of security to the achieved ciphertext. The proposed method showed that Arabic language characteristics steganography achieved 0.15 ms for 1 k, 1.0033 ms for 3 k, 2.331 ms for 5 k, and 5.22 ms for 10 k file sizes respectively.
Study was made on the optical properties of Ge2oSe8othinfilms prepared by vac-uum evaporation as radiated by (0,34,69) Gy of 13 ray.The optical band gab Eg and tailing band A.Et were studied in the photon energy range ( 1 to 3)eV. The a-Ge20Se8o film was found to be indirect gap with energy gap of (1.965,1.9 , 1.82) eV at radiated by B ray with absorption doses of (0,34,69)Gy respectively.The Ea and AEt of Ge20Se80 films showed adecrease in E8 and an increase in AEt with radiation. This be-havior may be related to structural defects and dangling bonds.
Three different distribution modules of silicon solar cells in a panel are used in this study . Each module consists of five identical circular silicon solar cells of radius (5cm) and then the total panel areas are identical. The five solar cells are arranged in the panel in different shapes: circular, triangular and rectangular .The efficiency for these three panel distribution are measured indoor and outdoor. The results show that the efficiency is a function of the cells distribution.
Malaysia has been supported by one of the high-speed fiber internet connections called TM UniFi. TM UniFi is very familiar to be used as a medium to apply Small Office Home Office (SOHO) concept due to the COVID-19 pandemic. Most of the communication vendors offer varieties of network services to fulfill customers' needs and satisfaction during the pandemic. Quality of Services is queried by most users by the fact of increased on users from time to time. Therefore, it is crucial to know the network performance contrary to the number of devices connected to the TM UniFi network. The main objective of this research is to analyze TM UniFi performance with the impact of multiple device connections or users' services. The study was conducted
... Show MoreThe shortage of irrigation water requires specific measures. One of these measures is the application of the rationing system (a period of irrigation followed by a period of drought). This system could have an effect on the behavior and properties of irrigation canals. So, studying rationing system on the irrigation canals is important both in civil engineering and water resources engineering, especially if these channels constructed with gypsum soil. This study includes the calculation of seepage velocity and water content in each cycle (10 days wetting and 10 days of drying). The model is built for this research contains four samples, two samples for untreated soil one of them expos
The electrochemical behavior of Al-17%Si alloy is investigated in 3.5wt% NaCl solution. Many alloys with addition of the different wt% magnesium metal of 1wt%, 2%, 3wt% ,4.5wt% ,and 9wt% were prepared by gravity die casting . The microstructures of prepared alloys were examined by optical and SEM microscopes. Corrosion behavior was investigated by using potentiostat instrument under static potentials test and corrosion current was recorded to determine corrosion resistance of all prepared samples. It was found that the addition of Mg metal improves the corrosion resistance of Al-17%Si alloy in 3.5%NaCl solution. The alloy containing 1%Mg shows less corrosion rate than the others while the alloys containing 4.5%Mg, 9%Mg content have
... Show MoreCrop production is reduced by insufficient and/or excess soil water, which can significantly decrease plant growth and development. Therefore, conservation management practices such as cover crops (CCs) are used to optimize soil water dynamics, since CCs can conserve soil water. The objective of this study was to determine the effects of CCs on soil water dynamics on a corn (
Copper electrodeposition by electrorefining process in acidic sulfate media contains 40 g/l of cupric ions and 160 g/l of sulfuric acid was achieved to study the influence of the operating parameters on cathode purity, surface morphology, deposition rate, current efficiency and power consumption. These operating parameters and there ranges are: current density 200, 300 and 400 A/m2, electrolyte temperature 35, 50 and 65 oC, electrodes spacing 15, 30 and 45 mm and electrolyte residence time 6, 4 and 2 h were utilized. XRF, SEM and EDX analyses were attained to clarify the properties of the produced cathode.
This study investigates the influence of Strategic Consensus (SC) on Organizational Performance (OP), with Strategic Alignment (SA) serving as a mediating variable, within private academic institutions in Iraq. The research utilized scales developed to measure each variable: SC, OP, and SA, all of which are unidimensional. The sample comprised 131 senior participants, including deans and faculty council members, with questionnaires distributed across three institutions: Dijla University College (35 respondents), Baghdad College of Economic Sciences (31 respondents), and the University of Uruk (65 respondents). Data analysis employed various statistical techniques, including normality testing, confirmatory factor analysis, descriptive statis
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More