Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space) position of in the cover text that used to hide the the secrete sender masseges. The experiments results show that the suggested method presents highly secret due to use the multi-level of complexity to avoid the attackers.
Regression testing is a crucial phase in the software development lifecycle that makes sure that new changes/updates in the software system don’t introduce defects or don’t affect adversely the existing functionalities. However, as the software systems grow in complexity, the number of test cases in regression suite can become large which results into more testing time and resource consumption. In addition, the presence of redundant and faulty test cases may affect the efficiency of the regression testing process. Therefore, this paper presents a new Hybrid Framework to Exclude Similar & Faulty Test Cases in Regression Testing (ETCPM) that utilizes automated code analysis techniques and historical test execution data to
... Show MorePapillary thyroid carcinoma (PTC) represents the most prevalent kind of thyroid gland cancer, making up around 80% of all occurrences of thyroid cancer. Evidence shows that Syndecan-1 (SDC-1) expression is lost in a number of benign and malignant epithelial neoplasms, although its expression profile in thyroid gland neoplasms is yet unknown. Therefore, the aim of this study was to assess SDC-1 expression in papillary thyroid carcinoma patients, as well as the relationship between age and gender and SDC-1 expression. To undertake a detailed investigation of SDC-1 in normal and malignant tissues, tissue sections were used to examine SDC-1 expression in 70 tissue samples, 50 distinct PTC (6 males and 44 females) and 20 normal tissue ty
... Show MoreA literary text is not void of the use of the ego and the other while speaking or in a spoken communication. Such a usage is apparently outstanding in Arabic literature, and it reflects society in all its various cultural, social and political conditions. Therefore, the ego is one of the prominent concepts on which human personality is built, and its role in the formation of society and in communicating among all human societies. Accordingly, the present paper aims to clarify the duality of the ego and the other, where the ego starts from the poet himself to expand the circle of subjectivity by including his family, society, immediate surroundings, race and his religion. The other, on the other hand, that is separated from the poet,
... Show MoreCommercial fish catch in the Iraqi marine waters from December 2018 to December 2019 was investigated. The study is based on three stations: the first station is located at the Shatt Al-Arab estuary, the second represents the area between the Shatt Al-Arab Estuary and open marine waters, and the third is associated with the Iraqi territorial marine waters. The total weight of the catch was 1881 kg, represented by 500, 654, and 727 kg in the first, second and third stations respectively. The third station was the highest with a majority of the family Sciaenidae by 464 kg, while the lowest was the family Scombridae by 0.5 kg. The total number of species included 37 species, belonging to 27 genera, 19 families, and 6 orders, the largest ord
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreABSTRACTBackground Subclinical hypothyroidism is mild thyroid hormone deficiency, defined by elevation of serum thyroid-stimulating hormone concentration despite a normal free T3, free T4 level, can be distinguished by clinical and circumstantial observations from other conditions that cause this constellation of laboratory findings. The aim is to find the prevalence, anthropologic, and metabolic changes associate subclinical hypothyroidism(SH) in adult patients presented to obesity research and therapy unit (ORTU Objective: To find the prevalence of subclinical hypothyroidism (SH) in adult obese patients presented to obesity research and therapy unit (ORTU) in AL-Kindy College of medicine and to describe the anthropologic and metabolic
... Show MoreThe mind map represents a system to solve problems including design problems, because it depends on employing the complex and purposeful mental activity, which starts from a desire based on the search and investigation in order to reach integrated results of scientific thinking, utilizing the objective view of the scientific and practical aspects from various angles. This visual system can develop thinking and shorten the retrieval time of the previous information in order to employ it in the solution finding system, that it evokes past experiences and relates them to current situations, then enables the user to choose a suitable solution for the problems. This visual, educational and circulatory means, at the same time, has speci
... Show MoreSub-threshold operation has received a lot of attention in limited performance applications.However, energy optimization of sub-threshold circuits should be performed with the concern of the performance limitation of such circuit. In this paper, a dual size design is proposed for energy minimization of sub-threshold CMOS circuits. The optimal downsizing factor is determined and assigned for some gates on the off-critical paths to minimize the energy at the maximum allowable performance. This assignment is performed using the proposed slack based genetic algorithm which is a heuristic-mixed evolutionary algorithm. Some gates are heuristically assigned to the original and the downsized design based on their slack time determined by static tim
... Show More