Preferred Language
Articles
/
IxbYIIgBVTCNdQwCknRG
Text hiding in text using invisible character
...Show More Authors

Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space) position of in the cover text that used to hide the the secrete sender masseges. The experiments results show that the suggested method presents highly secret due to use the multi-level of complexity to avoid the attackers.

Scopus Crossref
View Publication
Publication Date
Sun Jan 01 2023
Journal Name
Petroleum And Coal
Analyzing of Production Data Using Combination of empirical Methods and Advanced Analytical Techniques
...Show More Authors

Scopus (1)
Scopus
Publication Date
Mon Jul 31 2023
Journal Name
Iraqi Geological Journal
Estimation of the Fracturing Parameters and Reservoir Permeability Using Diagnostic Fracturing Injection Test
...Show More Authors

The term "tight reservoir" is commonly used to refer to reservoirs with low permeability. Tight oil reservoirs have caused worry owing to its considerable influence upon oil output throughout the petroleum sector. As a result of its low permeability, producing from tight reservoirs presents numerous challenges. Because of their low permeability, producing from tight reservoirs is faced with a variety of difficulties. The research aim is to performing hydraulic fracturing treatment in single vertical well in order to study the possibility of fracking in the Saady reservoir. Iraq's Halfaya oil field's Saady B reservoir is the most important tight reservoir. The diagnostic fracture injection test is determined for HF55using GOHFER soft

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Dec 18 2017
Journal Name
Al-khwarizmi Engineering Journal
Path Planning of an Autonomous Mobile Robot using Enhanced Bacterial Foraging Optimization Algorithm
...Show More Authors

This paper describes the problem of online autonomous mobile robot path planning, which is consisted of finding optimal paths or trajectories for an autonomous mobile robot from a starting point to a destination across a flat map of a terrain, represented by a 2-D workspace. An enhanced algorithm for solving the problem of path planning using Bacterial Foraging Optimization algorithm is presented. This nature-inspired metaheuristic algorithm, which imitates the foraging behavior of E-coli bacteria, was used to find the optimal path from a starting point to a target point. The proposed algorithm was demonstrated by simulations in both static and dynamic different environments. A comparative study was evaluated between the developed algori

... Show More
View Publication Preview PDF
Crossref (13)
Crossref
Publication Date
Sat Dec 30 2017
Journal Name
International Journal Of Heat And Technology
Optimization of a rectangular pin fin using rectangular perforations with different inclination angles
...Show More Authors

View Publication
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Engineering Science And Technology
Air entrained vortex occurrence at sump for inclined multiple intake pipes using cfd
...Show More Authors

Scopus (1)
Scopus
Publication Date
Tue Dec 31 2013
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of Iraqi Light Naphtha Octane Number Using Pt Supported HMOR Zeolite Catalyst
...Show More Authors

The hydroconversion of Iraqi light straight run naphtha was studied on zeolite catalyst. 0.3wt.%Pt/HMOR catalyst was prepared locally and used in the present work. The hydroconversion performed on a continuous fixed-bed laboratory reaction unit. Experiments were performed in the temperature range of 200 to 350°C, pressure range of 3 to 15 bars, LHSV range of 0.5-2.5h-1, and the hydrogen to naphtha ratio of 300.

The results show that the hydroconversion of Iraqi light straight naphtha increases with increase in reaction temperature and decreases with increase in LHSV.

High octane number isomers were formed at low temperature of 240°C. The selectivity of hydroisomerization improved by increasing reaction pressu

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 30 2016
Journal Name
Iraqi Geological Journal
ASSESSMENT OF GROUNDWATER QUALITY USING WATER QUALITY INDEXIN, AL-HAWIJA AREA, NORTHERN IRAQ
...Show More Authors

The quality of groundwater in the Al-Hawija area was assessed using a water quality index. Data of nine physico-chemical parameters of 28 groundwater wells were used to calculate the water quality index (WQI). A heterogeneous water quality was reported, where in close proximity to the Lesser Zab River (LZR), it has low WQI values and permissible for human consumptions due to the dilution processes by fresh water; whereas, it becomes deteriorated in areas located far away the river. The values of WQI ranges from 22 to 336, indicating a good to very poor groundwater quality.

View Publication
Crossref (2)
Crossref
Publication Date
Sat Mar 30 2024
Journal Name
Journal Of Kufa For Mathematics And Computer
Approximate Solution of Linear and Nonlinear Partial Differential Equations Using Picard’s Iterative Method
...Show More Authors

Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
COMPARATIVE STUDY FOR EDGE DETECTION OF NOISY IMAGE USING SOBEL AND LAPLACE OPERATORS
...Show More Authors

Many approaches of different complexity already exist to edge detection in
color images. Nevertheless, the question remains of how different are the results
when employing computational costly techniques instead of simple ones. This
paper presents a comparative study on two approaches to color edge detection to
reduce noise in image. The approaches are based on the Sobel operator and the
Laplace operator. Furthermore, an efficient algorithm for implementing the two
operators is presented. The operators have been applied to real images. The results
are presented in this paper. It is shown that the quality of the results increases by
using second derivative operator (Laplace operator). And noise reduced in a good

... Show More
View Publication Preview PDF