In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MoreIn this work, measurements of activity concentration of naturally occurring radioactive materials (NORM) isotopes and their related hazard indices for several materials such as crude oil, sludge and water in Ahdeb oil fields in Waste governorate using high pure germanium coaxial detection technique. The average values for crude oil samples were174.72Bq/l, 43.46Bq/l, 355.07Bq/l, 264.21Bq/l, 122.52nGy/h, 0.7138, 1.1861, 0.601 mSv/y, 0.1503mSv/y and 1.8361 for Ra-226, Ac-228, K-40, Ra eq, D, H-external and H-internal respectively. According to the results; the ratio between 238U to 232Th was 4, which represents the natural ratio in the crust earth; therefore, one can be strongly suggested that the geo-stricture of the
... Show MoreThe present study aims to develop and apply the unrealistic optimism scale among high school students. The researcher has designed a scale of (38) paragraphs to measure the unrealistic optimism. A sample of (200) male and female students were chosen randomly to collect the needed data. The study found that the unrealistic scale of optimism has good psychometric characteristics. The research sample has a high level of التفاؤل غير الواقعي لدى عينة البحث unrealistic optimism. There is a statistically significant difference between male and female in the unrealistic optimism in favor of the male students. Finally, there is a statistically significant difference between students in the fourth and sixth gra
... Show MoreCyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show MoreAn annular two-phase, steady and unsteady, flow model in which a conductingfluid flow under the action of magnetic field is concavely. Two models arepresented, in the model one; the magnetic field is perpendicular to the long side ofthe channel, while in the model two is perpendicular to the short side. Also, westudy, to some extent the single-phase liquid flow.It is found that the motion and heat transfer equations are controlled by differentdimensionless parameters namely, Reynolds, Hartmann, Prandtl, and Poiseuilleparameters. The Laplace transform technique is used to solve each of the motion andheat transfer equations. The effects of each of dimensionless parameters upon thevelocity and heat transfer is analyzed.A comprehensive study fo
... Show MoreEprospective study undertaken between January 2007 and January 2011, 58 consecutive cases with compound tibial shaft fractures. All fractures were stabilized by external fixator device AO/ASIF type after failed the manipulation under anesthesia (MUA) to restore the osseous alignment. In 32 patients cancellous bone graft were used from the upper part of the tibia to enhance healing process, all these patients were followed for an average of 8–12 months. Our findings showed that stabilization of the fracture shaft tibia by external fixation with cancellous bone graft had significantly better result, than external fixation alone. We conclude that unilateral, uniplanar external fixation with early bone grafting from upper part of the tibia is
... Show MoreWhat has reached us from this great heritage left by our scientists book ((masterpiece of honor by knowing the parties)) to the conservative privilege, which Imam Safadi said ((Sheikh of time, and the preservation of the era, and critic of the time, if his son Ibn Makola had a drink and eaten, and make it to him So, after trusting in God, I thought that I should write a paper highlighting the life of this great world and explaining its methodology in this useful book in which Imam Ibn Hajar al-Asqalani said: `` The use of it took place east and west, and the scholars competed in collecting it after. And soon)).
Background: Skull secondary tumors are malignant bone tumors which are increasing in incidence.Objective: The objectives of this study were to present clinical features , asses the outcome of patients with secondary skull tumors ,characterize the MRI features, locations, and extent of secondary skull tumors to determine the frequency of the symptomatic disease.Type of the study: This is a prospective study.Methods: This is a prospective study from February 2000 to February 2008. The patients were selected from five neurosurgical centers and one oncology hospital in Baghdad/Iraq. The inclusion criteria were MRI study of the head(either as an initial radiological study or following head CT scan when secondary brain tumor is suspected , vis
... Show MoreThe performance evaluation process requires a set of criteria and for the purpose of measuring the level of performance achieved by the Unit and the actual level of development of its activities, and in view of the changes and of rapid and continuous variables surrounding the Performance is a reflection of the unit's ability to achieve its objectives, as these units are designed to achieve the objectives of exploiting a range of economic resources available to it, and the performance evaluation process is a form of censorship, focusing on the analysis of the results obtained from the achievement All its activities with a view to determining the extent to which the Unit has achieved its objectives using the resources available to it and h
... Show More