Preferred Language
Articles
/
IxbYIIgBVTCNdQwCknRG
Text hiding in text using invisible character
...Show More Authors

Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space) position of in the cover text that used to hide the the secrete sender masseges. The experiments results show that the suggested method presents highly secret due to use the multi-level of complexity to avoid the attackers.

Scopus Crossref
View Publication
Publication Date
Tue Aug 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Identifying the factors affecting in the Intentions to continue using of the government social media
...Show More Authors

Abstract

Social media has thrived recently and public organizations at Thi-Qar governorate across different levels are experimenting with launching government social media (GSM) to facilitating two-way interactions between the government and its citizens. Both scholars and practitioners are focusing on understanding the key success factors related to the create of GSM. This study aimed to identify the key success factors by exploring the formation mechanism of individuals’ continuous usage intention. Through the theoretical perspective of the uses and gratifications theory. We identify the gratification factors that stimulate users’ continuance intention toward GSM. Furthermore, we draw upon the stimulus–organism–

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Ndt & E International
Porosity evaluation of in-service thermal barrier coated turbine blades using a microwave nondestructive technique
...Show More Authors

View Publication
Scopus (19)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Applied Energy
Melting enhancement in triplex-tube latent heat energy storage system using nanoparticles-metal foam combination
...Show More Authors

View Publication
Scopus (280)
Crossref (274)
Scopus Clarivate Crossref
Publication Date
Wed Sep 20 2017
Journal Name
Mechanical Sciences
Comparative experimental investigation and gap flow simulation in electrical discharge drilling using new electrode geometry
...Show More Authors

Abstract. This study presents experimental and numerical investigation on the effectiveness of electrode geometry on flushing and debris removal in Electrical Discharge Drilling (EDD) process. A new electrode geometry, namely side-cut electrode, was designed and manufactured based on circular electrode geometry. Several drilling operations were performed on stainless steel 304 using rotary tubular electrodes with circular and side-cut geometries. Drilling performance was characterized by Material Removal Rate (MRR), Electrode Wear Rate (EWR), and Tool Wear Ratio (TWR). Dimensional features and surface quality of drilled holes were evaluated based on Overcut (OC), Hole Depth (HD), and Surface Roughness (SR). Three-dimensional

... Show More
View Publication
Scopus (5)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of The American Medical Directors Association
Comprehensive Literature Review of Factors Influencing Medication Safety in Nursing Homes: Using a Systems Model
...Show More Authors

View Publication
Scopus (49)
Crossref (53)
Scopus Clarivate Crossref
Publication Date
Sun Jun 21 2020
Journal Name
Baghdad Science Journal
Spectrophotometer Determination of Cefixime in pure form and pharmaceutical preparation by Using Cloud point Extraction
...Show More Authors

Two simple methods spectrophotometric were suggested for the determination of Cefixime (CFX) in pure form and pharmaceutical preparation. The first method is based without cloud point (CPE) on diazotization of the Cefixime drug by sodium nitrite at 5Cº followed by coupling with ortho nitro phenol in basic medium to form orange colour. The product was stabilized and measured 400 nm. Beer’s law was obeyed in the concentration range of (10-160) μg∙mL-1 Sandell’s sensitivity was 0.0888μg∙cm-1, the detection limit was 0.07896μg∙mL-1, and the limit of Quantitation was 0.085389μg∙mL-1.The second method was cloud point extraction (CPE) with using  Trtion X-114 as surfactant. Beer

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sun Mar 26 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Spectrophotometric Determination of Nitrofurantoin Drug in its Pharmaceutical Formulations Using MBTH as a Coupling Reagent
...Show More Authors

A direct, sensitive and efficient spectrophotometric method for the determination of nitrofurantoin
drug (NIT) in pure as well as in dosage form (capsules) was described. The suggested method was
based on reduction NIT drug using Zn/HCl and then coupling with 3-methyl-2-benzothiazolinone
hydrazone hydrochloride (MBTH) in the presence of ammonium ceric sulfate. Spectrophotometric
measurement was established by recording the absorbance of the green colored product at 610 nm.
Using the optimized reaction conditions, beer’s law was obeyed in the range of 0.5-30 μg/mL, with
good correlation coefficient of 0.9998 and limits of detection and quantitation of 0.163 and 0.544
μg/mL, respectively. The accuracy and

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Shadow Removal Using Segmentation Method
...Show More Authors

Shadow detection and removal is an important task when dealing with color outdoor images. Shadows are generated by a local and relative absence of light. Shadows are, first of all, a local decrease in the amount of light that reaches a surface. Secondly, they are a local change in the amount of light rejected by a surface toward the observer. Most shadow detection and segmentation methods are based on image analysis. However, some factors will affect the detection result due to the complexity of the circumstances. In this paper a method of segmentation test present to detect shadows from an image and a function concept is used to remove the shadow from an image.

View Publication Preview PDF
Publication Date
Sat Mar 10 2012
Journal Name
الدنانير
Cryptography Using Artificial Neural Network
...Show More Authors

Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.

Preview PDF
Publication Date
Tue Dec 27 2022
Journal Name
2022 3rd Information Technology To Enhance E-learning And Other Application (it-ela)
Diabetes Prediction Using Machine Learning
...Show More Authors

Diabetes is one of the increasing chronic diseases, affecting millions of people around the earth. Diabetes diagnosis, its prediction, proper cure, and management are compulsory. Machine learning-based prediction techniques for diabetes data analysis can help in the early detection and prediction of the disease and its consequences such as hypo/hyperglycemia. In this paper, we explored the diabetes dataset collected from the medical records of one thousand Iraqi patients. We applied three classifiers, the multilayer perceptron, the KNN and the Random Forest. We involved two experiments: the first experiment used all 12 features of the dataset. The Random Forest outperforms others with 98.8% accuracy. The second experiment used only five att

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref