Preferred Language
Articles
/
IxbYIIgBVTCNdQwCknRG
Text hiding in text using invisible character
...Show More Authors

Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space) position of in the cover text that used to hide the the secrete sender masseges. The experiments results show that the suggested method presents highly secret due to use the multi-level of complexity to avoid the attackers.

Scopus Crossref
View Publication
Publication Date
Mon Jun 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
The possibility of Using the Low-Cost External Antenna with Smartphone for Accurate Surveying Applications by RTX Technology
...Show More Authors
Abstract<p>Real Time Extended (RTX) technology works to take advantage of real-time data comes from the global network of tracking stations together with inventor locating and compression algorithms to calculate and relaying the orbit of satellite, satellite atomic clock, and any other systems corrections to the receivers, which lead to real-time correction with high accuracy. These corrections will be transferred to the receiver antenna by satellite (where coverage is available) and by IP (Internet Protocol) for the rest of world to provide the accurate location on the screen of smartphone or tablet by using specific software. The purpose of this study was to assess the accuracy of Global Navig</p> ... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Mon Aug 01 2011
Journal Name
Journal Of Engineering
PREPARATION OF ACTIVATED CARBONS FROM DATE STONES BY CHEMICAL ACTIVATION METHOD USING FeCl3 and ZnCl2 as ACTIVATING AGENTS
...Show More Authors

Date stones were used as precursor for the preparation of activated carbons by chemical
activation with ferric chloride and zinc chloride. The effects of operating conditions represented
by the activation time, activation temperature, and impregnation ratio on the yield and adsorption
capacity towards methylene blue (MB) of prepared activated carbon by ferric chloride activation
(FAC) and zinc chloride activation (ZAC) were studied. For FAC, an optimum conditions of 1.25
h activation time, 700 °C activation temperature, and 1.5 impregnation ratio gave 185.15 mg/g
MB uptake and 47.08 % yield, while for ZAC, 240.77 mg/g MB uptake and 40.46 % yield were
obtained at the optimum conditions of 1.25 h activation time, 500

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Structure properties of cobalt dioxide (CoO2) thin films effected by violet and red lasers irradiation using (SCSP) technique
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Chemical Industry And Chemical Engineering Quarterly
Optimization of dye adsorption process for Albizia lebbeck pods as a biomass using central composite rotatable design model
...Show More Authors

Albizia lebbeck biomass was used as an adsorbent material in the present study to remove methyl red dye from an aqueous solution. A central composite rotatable design model was used to predict the dye removal efficiency. The optimization was accomplished under a temperature and mixing control system (37?C) with different particle size of 300 and 600 ?m. Highest adsorption efficiencies were obtained at lower dye concentrations and lower weight of adsorbent. The adsorption time, more than 48 h, was found to have a negative effect on the removal efficiency due to secondary metabolites compounds. However, the adsorption time was found to have a positive effect at high dye concentrations and high adsorbent weight. The colour removal effi

... Show More
View Publication
Scopus (13)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Measurement of the distance to the central stars of Nebulae by using Expansion methods with Alladin Sky Atlas
...Show More Authors
Abstract<p>The usual methods of distance determination in Astronomy parallax and Spectroscopic with Expansion Methods are seldom applicable to Nebulae. In this work determination of the distances to individual Nebulae are calculated and discussed. The distances of Nebulae to the Earth are calculated. The accuracy of the distance is tested by using Aladin sky Atlas, and comparing Nebulae properties were derived from these distance made with statistical distance determination. The results showed that angular Expansions may occur in a part of the nebulae that is moving at a velocity different than the observed velocity. Also the results of the comparison of our spectroscopic distances with the trig</p> ... Show More
View Publication
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Using Six-Sigma to measure the quality performance of the Department of Statistics-University of Baghdad-Case Study
...Show More Authors

Abstract

            This research was to provide a definition of quality, dimensions and concepts, whether traditional or modern concept, as well as review the dimensions of quality in higher education and vision and mission with the overall objectives of the Statistics Department.

         After reviewing quality goals and purposes achieved as well as the mechanisms used to achieve them. and use standard Six-Sigma as one of the methodologies used in quality with the historical roots of using this methodology and methods applied and their definitions t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Euphrates Journal Of Agricultural Science 7 (4)‏
Recognize the Sex of date palm Using Randomly Amplified Polymorphic DNA (RAPD) and some Traditional and Chemical Methods‏
...Show More Authors

Publication Date
Thu Mar 31 2022
Journal Name
Iraqi Geological Journal
Development of New Models to Determine the Rheological Parameters of Water-Based Drilling Fluid using Artificial Neural Networks
...Show More Authors

It is well known that drilling fluid is a key parameter for optimizing drilling operations, cleaning the hole, and managing the rig hydraulics and margins of surge and swab pressures. Although the experimental works represent valid and reliable results, they are expensive and time consuming. In contrast, continuous and regular determination of the rheological fluid properties can perform its essential functions during good construction. The aim of this study is to develop empirical models to estimate the drilling mud rheological properties of water-based fluids with less need for lab measurements. This study provides two predictive techniques, multiple regression analysis and artificial neural networks, to determine the rheological

... Show More
Crossref
Publication Date
Thu Jan 12 2023
Journal Name
Journal Of The Saudi Society Of Agricultural Sciences
Effect of planting density, foliar spraying and overlapping system on the growth and productivity using soilless culture system
...Show More Authors

Scopus (5)
Scopus