In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harnesses the unique attributes of this language, encompassing its complex character designs, diacritical marks, and ligatures, to effectively protect information. In this work, we propose a new text steganography method based on Arabic language characteristics concealment, where the proposed method has two levels of security which are: Arabic encoding and word shifting. In the first step, build a new Arabic encoding mapping table to convert an English plaintext to Arabic characters, then use a word shifting process to add an authentication phase for the sending message and add another level of security to the achieved ciphertext. The proposed method showed that Arabic language characteristics steganography achieved 0.15 ms for 1 k, 1.0033 ms for 3 k, 2.331 ms for 5 k, and 5.22 ms for 10 k file sizes respectively.
In real conditions of structures, foundations like retaining walls, industrial machines and platforms in offshore areas are commonly subjected to eccentrically inclined loads. This type of loading significantly affects the overall stability of shallow foundations due to exposing the foundation into two components of loads (horizontal and vertical) and consequently reduces the bearing capacity.
Based on a numerical analysis performed using finite element software (Plaxis 3D Foundation), the behavior of model strip foundation rested on dry sand under the effect of eccentric inclined loads with different embedment ratios (D/B) ranging from (0-1) has been explored. The results display that, the bearing capacity of st
... Show MoreIn this research, carbon nanotubes (CNTs) is prepared through the Hummers method with a slight change in some of the work steps, thus, a new method has been created for preparing carbon nanotubes which is similar to the original Hummers method that is used to prepare graphene oxide. Then, the suspension carbon nanotubes is transferred to a simple electrode position platform consisting of two electrodes and the cell body for the coating and reduction of the carbon nanotubes on ITO glass which represents the cathode electrode while platinum represents the anode electrode. The deposited layer of carbon nanotubes is examined through the scanning electron microscope technique (SEM), and the images throughout the research show the
... Show MoreThe comparative method plays a major role in Maupassant’s novel (A woman’s Life).This is due to a good theme choice and smooth writing style characterized by simplicity, spontaneity and brevity.
The author uses the comparative method in the introduction of his novel where he compares the monastery’s closed world to the open world of the countryside of La Normandie, which represents the dream life of the heroine Jeanne.
The present paper is an attempt to answer the question regarding the importance of applying the comparative method in the novel (A Woman’s Life) by Maupassant. The paper stresses the fact that the novelist employs the comparative method in his book for certain features .One of these features is the
... Show MoreMany important archaeological sites in Iraq still need to be preserved. Some of these sites were subjected to destruction and negligence. So, exploring these sites represents a priority for its protection. A 2D Electrical Resistivity Imaging (ERI) as a non-invasive geophysical survey method was implemented at a part of the Borsippa archaeological site near Babylon to search for the subsurface archaeological artefacts/structures. Electrical resistivity measurements were carried out using a Dipole-Dipole array. Steps were taken to process and filter using Horizontal profiles, forward modelling, and 2D inverse models to analyze the resistivity measurements. The ERI inversion results show that the superficial conductive zone produced va
... Show MoreMarkov chains are an application of stochastic models in operation research, helping the analysis and optimization of processes with random events and transitions. The method that will be deployed to obtain the transient solution to a Markov chain problem is an important part of this process. The present paper introduces a novel Ordinary Differential Equation (ODE) approach to solve the Markov chain problem. The probability distribution of a continuous-time Markov chain with an infinitesimal generator at a given time is considered, which is a resulting solution of the Chapman-Kolmogorov differential equation. This study presents a one-step second-derivative method with better accuracy in solving the first-order Initial Value Problem
... Show MoreA simple and highly sensitive cloud point extraction process was suggested for preconcentration of micrograms amount of isoxsuprine hydrochloride (ISX) in pure and pharmaceutical samples. After diazotization coupling of ISX with diazotized sulfadimidine in alkaline medium, the azo-dye product quantitatively extracted into the Triton X-114 rich phase, dissolved in ethanol and determined spectrophotometrically at 490 nm. The suggested reaction was studied with and without extraction and simple comparison between the batch and CPE methods was achieved. Analytical variables including concentrations of reagent, Triton X-114 and base, incubated temperature, and time were carefully studied. Under the selected optimum conditions,
... Show MoreThis research concern to analyse and simulate the temperature distribution in the spot welding joints using tungsten arc welding shielded with inert gas (TIG Spot) for the aluminum-magnesium alloy type (5052-O).
The effect of and the quantity of the heat input that enter the weld zone has been investigated welding current, welding time and arc length on temperature distribution. The finite element method (by utilizing programme ANSYS 5.4) is presented the temperature distribution in a circular weld pool and the weld pool penetration (depth of welding) through the top sheet ,across the interface into the lower sheet forming a weld spot. &nbs
... Show More