In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MoreDeep learning convolution neural network has been widely used to recognize or classify voice. Various techniques have been used together with convolution neural network to prepare voice data before the training process in developing the classification model. However, not all model can produce good classification accuracy as there are many types of voice or speech. Classification of Arabic alphabet pronunciation is a one of the types of voice and accurate pronunciation is required in the learning of the Qur’an reading. Thus, the technique to process the pronunciation and training of the processed data requires specific approach. To overcome this issue, a method based on padding and deep learning convolution neural network is proposed to
... Show MoreThis paper proposes a completion that can allow fracturing four zones in a single trip in the well called “Y” (for confidential reasons) of the field named “X” (for confidential reasons). The steps to design a well completion for multiple fracturing are first to select the best completion method then the required equipment and the materials that it is made of. After that, the completion schematic must be drawn by using Power Draw in this case, and the summary installation procedures explained. The data used to design the completion are the well trajectory, the reservoir data (including temperature, pressure and fluid properties), the production and injection strategy. The results suggest that multi-stage hydraulic fracturing can
... Show MorePhenoxathiin was prepared by the reaction of diphenyl ether with sulfur in the presence of anhydrous aluminum chloride. This work comprised the synthesis of new phenoxathiin derivatives containing heterocyclic moieties. These heterocyclic compounds were synthesized in three groups. The first group was made up of 2-(oxoalken-1-yl) phenoxathiin derivatives (3a-3j) obtained from the reaction of 2-acetylphenoxathiin with different aromatic aldehyde in the presence of sodium hydroxide. The other two groups involved compounds produced from the reaction of (3a-3j) with hydrazine hydrate in acetic acid to get 2-(1-acetyl pyrazolin-3-yl) phenoxathiin derivatives (4a-4j), and phenyl hydrazine in the presence of piperidine to afford 2-(1-phenyl pyrazo
... Show MoreMany of the elementary transformations of determinants which are used in their evaluation and in the solution of linear equations may by expressed in the notation of matrices. In this paper, some new interesting formulas of special matrices are introduced and proved that the determinants of these special matrices have the values zero. All formulation has been coded in MATLAB 7.
Simplification of new fashion design methods